acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Three-Volume History of Counterintelligence
From Schneier on Security

Three-Volume History of Counterintelligence

CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....

The U.S. Seems to Have a Secret Stealth Helicopter
From Schneier on Security

The U.S. Seems to Have a Secret Stealth Helicopter

That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...

Keeping Sensitive Information Out of the Hands of Terrorists Through Self-Restraint
From Schneier on Security

Keeping Sensitive Information Out of the Hands of Terrorists Through Self-Restraint

In my latest book (available February), I talk about various mechanisms for societal security: how we as a group protect ourselves from the "dishonest minority"...

Lockheed Martin Hack Linked to RSA's SecurID Breach
From Schneier on Security

Lockheed Martin Hack Linked to RSA's SecurID Breach

All I know is what I read in the news.

Aggressive Social Engineering Against Consumers
From Schneier on Security

Aggressive Social Engineering Against Consumers

Cyber criminals are getting aggressive with their social engineering tactics. Val Christopherson said she received a telephone call last Tuesday from a man stating...

Friday Squid Blogging: Hand-Cut Paper Silhouette
From Schneier on Security

Friday Squid Blogging: Hand-Cut Paper Silhouette

Surprisingly pretty.

Apple's iOS 4 Hardware Encryption Cracked
From Schneier on Security

Apple's iOS 4 Hardware Encryption Cracked

All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...

U.S. Presidential Limo Defeated by Steep-Grade Parking Ramp
From Schneier on Security

U.S. Presidential Limo Defeated by Steep-Grade Parking Ramp

It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...

Black Box Records in Automobiles
From Schneier on Security

Black Box Records in Automobiles

Proposed new rules in the U.S.

Blackhole Exploit Kit
From Schneier on Security

Blackhole Exploit Kit

It's now available as a free download: A free version of the Blackhole exploit kit has appeared online in a development that radically reduces the entry-level...

New Siemens SCADA Vulnerabilities Kept Secret
From Schneier on Security

New Siemens SCADA Vulnerabilities Kept Secret

SCADA systems -- computer systems that control industrial processes -- are one of the ways a computer hack can directly affect the real world. Here, the fearssuccessfully...

Dropbox Security
From Schneier on Security

Dropbox Security

I haven't written about Dropbox's security problems; too busy with the book. But here's an excellent summary article from The Economist. The meta-issue is pretty...

Friday Squid Blogging: Plush Squid
From Schneier on Security

Friday Squid Blogging: Plush Squid

Very cute.

CDC on the Zombie Apocalypse
From Schneier on Security

CDC on the Zombie Apocalypse

The Centers for Disease Control and Prevention weigh in on preparations for the zombie apocalypse.

The Normalization of Security
From Schneier on Security

The Normalization of Security

TSA-style security is now so normal that it's part of a Disney ride: The second room of the queue is now a security check area, similar to a TSA checkpoint. The...

Forged Subway Passes in Boston
From Schneier on Security

Forged Subway Passes in Boston

For years, an employee of Cubic Corp -- the company who makes the automatic fair card systems for most of the subway systems around the world -- forged forged and...

BIOS Protection
From Schneier on Security

BIOS Protection

NIST has released "BIOS Protection Guidelines."

Bin Laden Maintained Computer Security with an Air Gap
From Schneier on Security

Bin Laden Maintained Computer Security with an Air Gap

From the Associated Ptress: Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the U.S....

Mobile Phone Privacy App Contest
From Schneier on Security

Mobile Phone Privacy App Contest

Entries due by the end of the month.

Fingerprint Scanner that Works at a Distance
From Schneier on Security

Fingerprint Scanner that Works at a Distance

Scanning fingerprints from six feet away. Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account