acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Yet Another "People Plug in Strange USB Sticks" Story
From Schneier on Security

Yet Another "People Plug in Strange USB Sticks" Story

I'm really getting tired of stories like this: Computer disks and USB sticks were dropped in parking lots of government buildings and private contractors, andcourse...

Common PINs
From Schneier on Security

Common PINs

There's some great data on common iPhone passwords. I'm sure the results also apply to banking PINs.

Friday Squid Blogging: Eating Humboldt Squid
From Schneier on Security

Friday Squid Blogging: Eating Humboldt Squid

Chris Cosentino, chef at Incanto in San Francisco, wants to serve you Humboldt squid.

Selling a Good Reputation on eBay
From Schneier on Security

Selling a Good Reputation on eBay

Here's someone who is selling positive feedback on eBay: Hello, for sale is a picture of a tree. This tree is an original and was taken by me. I have gotten...

Assisting a Hostage Taker via Facebook
From Schneier on Security

Assisting a Hostage Taker via Facebook

It's a new world: An armed Valdez, 36, held a woman hostage at a motel in a tense 16-hour, overnight standoff with SWAT teams, all while finding time to keep his...

Protecting Private Information on Smart Phones
From Schneier on Security

Protecting Private Information on Smart Phones

AppFence is a technology -- with a working prototype -- that protects personal information on smart phones. It does this by either substituting innocuous information...

NSA Style Manual
From Schneier on Security

NSA Style Manual

National Security Agency (NSA) SIGINT Reporter's Style and Usage Manual, 2010.

Insider Attack Against M&A Information in Document Titles
From Schneier on Security

Insider Attack Against M&A Information in Document Titles

Protecting against insiders is hard. Kluger and two accomplices -- a Wall Street trader and a mortgage broker -- allegedly stole and traded on material nonpublic...

Did Reason Evolve as a Persuasion Tool?
From Schneier on Security

Did Reason Evolve as a Persuasion Tool?

Many of our informal security systems involve convincing others to do what we want them to. Here's a theory that says human reasoning evolved not as a tool tohere...

Firesheep in Use
From Schneier on Security

Firesheep in Use

Nice article on Firesheep in action.

My Next Book: Title and Cover
From Schneier on Security

My Next Book: Title and Cover

As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...

The Problem with Cyber-crime Surveys
From Schneier on Security

The Problem with Cyber-crime Surveys

Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research. Abstract: Much of the information we have on cyber-crime...

The Life Cycle of Cryptographic Hash Functions
From Schneier on Security

The Life Cycle of Cryptographic Hash Functions

Nice chart.

RAND Corporation on Trusted Traveler
From Schneier on Security

RAND Corporation on Trusted Traveler

New paper: "Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise": Current aviation...

Fourth SHB Workshop
From Schneier on Security

Fourth SHB Workshop

I'm at SHB 2011, the fourth Interdisciplinary Workshop on Security and Human Behavior, at Carnegie Mellon University. This is a two-day invitational gathering of...

Friday Squid Blogging: Beautiful Deep-Sea Squid Picture
From Schneier on Security

Friday Squid Blogging: Beautiful Deep-Sea Squid Picture

From the Telegraph (also here).

Horse "No Ride" List
From Schneier on Security

Horse "No Ride" List

Excellent satire.

Court Ruling on "Reasonable" Electronic Banking Security
From Schneier on Security

Court Ruling on "Reasonable" Electronic Banking Security

One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...

The Decline of al Qaeda
From Schneier on Security

The Decline of al Qaeda

Interesting essay.

Threat Models Colliding at Movie-Theater Projectors
From Schneier on Security

Threat Models Colliding at Movie-Theater Projectors

Interesting.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account