acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

This Suspicious Photography Stuff Is Confusing
From Schneier on Security

This Suspicious Photography Stuff Is Confusing

See: Last week, Metro Transit Police received a report from a rider about suspicious behavior at the L'Enfant Plaza station and on an Orange Line train to Vienna...

Garfield Comic
From Schneier on Security

Garfield Comic

Merry Christmas.

Friday Squid Blogging: Great Flying Squid Photo
From Schneier on Security

Friday Squid Blogging: Great Flying Squid Photo

Great photo.

Friday Squid Blogging: Squid Nativity
From Schneier on Security

Friday Squid Blogging: Squid Nativity

Merry Christmas.

PlugBot
From Schneier on Security

PlugBot

Interesting: PlugBot is a hardware bot. It's a covert penetration testing device designed for use during physical penetration tests. PlugBot is a tiny computer...

Cyberwar Movie Plot from an Actual Thriller Writer
From Schneier on Security

Cyberwar Movie Plot from an Actual Thriller Writer

It could make a good movie.

Interview with the European Union Privacy Chief
From Schneier on Security

Interview with the European Union Privacy Chief

Interesting interview with Viviane Reding, the vice president of the EU Justice Commission and head of privacy regulation: The basic values in Europe are that...

Interview with TSA Administrator John Pistole
From Schneier on Security

Interview with TSA Administrator John Pistole

He's more realistic than one normally hears: So if they get through all those defenses, they get to Reagan [National Airport] over here, and they've got an underwear...

Adam Shostack on TSA Threat Modeling
From Schneier on Security

Adam Shostack on TSA Threat Modeling

Good commentary: I've said before and I'll say again, there are lots of possible approaches to threat modeling, and they all involve tradeoffs. I've commentedthe...

Recording the Police
From Schneier on Security

Recording the Police

I've written a lot on the "War on Photography," where normal people are harassed as potential terrorists for taking pictures of things in public. This article...

Book Review: <i>Cyber War</i>
From Schneier on Security

Book Review: Cyber War

Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010. Cyber War is a fast and enjoyable...

Computational Forensics
From Schneier on Security

Computational Forensics

Interesting article from IEEE Spectrum: During two years of deliberation by the National Academy's forensic science committee (of which I was a member), a troubling...

"Architecture of Fear"
From Schneier on Security

"Architecture of Fear"

I like the phrase: N

Friday Squid Blogging: Prosthetic Tentacle
From Schneier on Security

Friday Squid Blogging: Prosthetic Tentacle

Impressive: Designed for a class project while getting her degree at the Industrial Design Department at the University of Washington, Kaylene Kau has not only...

Hiding PETN from Full-Body Scanners
From Schneier on Security

Hiding PETN from Full-Body Scanners

From the Journal of Transporation Security, "An evaluation of airport x-ray backscatter units based on image characteristics," by Leon Kaufman and Joseph W. Carlson...

Did the FBI Plant Backdoors in OpenBSD?
From Schneier on Security

Did the FBI Plant Backdoors in OpenBSD?

It has been accused of it. I doubt this is true. One, it's a very risky thing to do. And two, there are more than enough exploitable security vulnerabilities...

Fake Amazon Receipt Generators
From Schneier on Security

Fake Amazon Receipt Generators

They can be used to scam Amazon Marketplace merchants: What happens once our scammer is armed with his fake receipt? Well, many sellers on Amazon will ask you...

Security in 2020
From Schneier on Security

Security in 2020

There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something...

Open Source Digital Forensics
From Schneier on Security

Open Source Digital Forensics

A good resource.

Realistic Masks
From Schneier on Security

Realistic Masks

They're causing problems: A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account