acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Risk Reduction Strategies on Social Networking Sites
From Schneier on Security

Risk Reduction Strategies on Social Networking Sites

By two teenagers: Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesn

Software Monoculture
From Schneier on Security

Software Monoculture

In 2003, a group of security experts -- myself included -- published a paper saying that 1) software monocultures are dangerous and 2) Microsoft, being the largest...

The Constitutionality of Full-Body Scanners
From Schneier on Security

The Constitutionality of Full-Body Scanners

Jeffrey Rosen opines: Although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals forThe...

Mohamed Osman Mohamud
From Schneier on Security

Mohamed Osman Mohamud

I agree with Glenn Greenwald. I don't know if it's an actual terrorist that the FBI arrested, or if it's another case of entrapment. All of the information about...

Zoo Security
From Schneier on Security

Zoo Security

From a study on zoo security: Among other measures, the scientists recommend not allowing animals to walk freely within the zoo grounds, and ensuring there is...

Causing Terror on the Cheap
From Schneier on Security

Causing Terror on the Cheap

Total cost for the Yemeni printer cartridge bomb plot: $4200. "Two Nokia mobiles, $150 each, two HP printers, $300 each, plus shipping, transportation and other...

Friday Squid Blogging: Studying Squid Hearing
From Schneier on Security

Friday Squid Blogging: Studying Squid Hearing

At Woods Hole: It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...

Psychopaths and Security
From Schneier on Security

Psychopaths and Security

I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...

The Withdrawal of the A5/2 Encryption Algorithm
From Schneier on Security

The Withdrawal of the A5/2 Encryption Algorithm

Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.

The DHS is Getting Rid of the Color-Coded Terrorism Alert System
From Schneier on Security

The DHS is Getting Rid of the Color-Coded Terrorism Alert System

Good. It was always a dumb idea: The color-coded threat levels were doomed to fail because "they don

New ATM Skimming Attack
From Schneier on Security

New ATM Skimming Attack

In Europe, although the article doesn't say where: Many banks have fitted ATMs with devices that are designed to thwart criminals from attaching skimmers to the...

David Kahn Donates his Cryptography Collection to the National Cryptologic Museum
From Schneier on Security

David Kahn Donates his Cryptography Collection to the National Cryptologic Museum

Good for him. I think that's where my collection will be going, too.

Spoofing Geolocation
From Schneier on Security

Spoofing Geolocation

How to spoof your location on Facebook with your BlackBerry.

Me on Airport Security
From Schneier on Security

Me on Airport Security

Yesterday I participated in a New York Times "Room for Debate" discussion on airline security. My contribution is nothing I haven't said before, so I won't reprint...

Defeating al Qaeda
From Schneier on Security

Defeating al Qaeda

Rare common sense: But Gen Richards told the BBC it was not possible to defeat the Taliban or al-Qaeda militarily. "You can't. We've all said this. David Petraeus...

Stuxnet News
From Schneier on Security

Stuxnet News

Another piece of the puzzle: New research, published late last week, has established that Stuxnet searches for frequency converter drives made by Fararo Paya of...

Friday Squid Blogging: Flying Squid
From Schneier on Security

Friday Squid Blogging: Flying Squid

Photographic evidence from Jamaica.

Me on Cyberwar
From Schneier on Security

Me on Cyberwar

Last week, I gave a talk on cyberwar and cyberconflict at the Institute for International and European Affairs in Dublin. Here's the video. It was only the second...

TSA Backscatter X-ray Backlash
From Schneier on Security

TSA Backscatter X-ray Backlash

Things are happening so fast that I don't know if I should bother. But here are some links and observations. The head of the Allied Pilots Association is telling...

Airplane Terrorism Twenty Years Ago
From Schneier on Security

Airplane Terrorism Twenty Years Ago

Excellent: Here's a scenario: Middle Eastern terrorists hijack a U.S. jetliner bound for Italy. A two-week drama ensues in which the plane's occupants are split...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account