acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Third SHB Workshop
From Schneier on Security

Third SHB Workshop

I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...

Friday Squid Blogging: Vampire Squid
From Schneier on Security

Friday Squid Blogging: Vampire Squid

The vampire squid can turn itself inside out to avoid predators.

Hacker Scare Story
From Schneier on Security

Hacker Scare Story

"10 Everyday Items Hackers Are Targeting Right Now" 5. Your Blender. Yes, Your Blender That's right: your blender is under attack! Most mixers are self-contained...

Security Trade-Offs in Crayfish
From Schneier on Security

Security Trade-Offs in Crayfish

Interesting: The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...

TacSat-3 "Hyperspectral" Spy Satellite
From Schneier on Security

TacSat-3 "Hyperspectral" Spy Satellite

It's operational: The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...

WikiLeaks
From Schneier on Security

WikiLeaks

Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker. Assange is an international trafficker, of sorts. He and his colleagues collect...

Popsicle Makers a Security Threat
From Schneier on Security

Popsicle Makers a Security Threat

Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival: No...

How Much Counterterrorism Can We Afford?
From Schneier on Security

How Much Counterterrorism Can We Afford?

In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote: "High-tech, low-tech, we can't...

The Real Risk: Traffic Deaths
From Schneier on Security

The Real Risk: Traffic Deaths

The New York Times Room for Debate blog did the topic: "Do We Tolerate Too Many Traffic Deaths?"

Buying an ATM Skimmer
From Schneier on Security

Buying an ATM Skimmer

Interesting: TM skimmers -- or fraud devices that criminals attach to cash machines in a bid to steal and ultimately clone customer bank card data -- are marketed...

Cheating on Tests, by the Teachers
From Schneier on Security

Cheating on Tests, by the Teachers

If you give people enough incentive to cheat, people will cheat: Of all the forms of academic cheating, none may be as startling as educators tampering with children's...

AT&T's iPad Security Breach
From Schneier on Security

AT&T's iPad Security Breach

I didn't write about the recent security breach that disclosed tens of thousands of e-mail addresses and ICC-IDs of iPad users because, well, there was nothingwere...

Friday Squid Blogging: LOLSquid
From Schneier on Security

Friday Squid Blogging: LOLSquid

It's supposed to be a classic, but I've never seen it before.

Remote Printing to an E-Mail Address
From Schneier on Security

Remote Printing to an E-Mail Address

This is cool technology from HP: Each printer with the ePrint capability will be assigned its own e-mail address. If someone wants to print a document from an...

The Continuing Incompetence of Terrorists
From Schneier on Security

The Continuing Incompetence of Terrorists

The Atlantic on stupid terrorists: Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it's fair toPortrait...

Hot Dog Security
From Schneier on Security

Hot Dog Security

A nice dose of risk reality: Last week, the American Academy of Pediatrics issued a statement calling for large-type warning labels on the foods that kids most...

Patrolling the U.S./Canada Border
From Schneier on Security

Patrolling the U.S./Canada Border

Doesn't the DHS have anything else to do? As someone who believes that our nation has a right to enforce its borders, I should have been gratified when the Immigrations...

Filming the Police
From Schneier on Security

Filming the Police

In at least three U.S. states, it is illegal to film an active duty policeman: The legal justification for arresting the "shooter" rests on existing wiretapping...

Dating Recordings by Power Line Interference
From Schneier on Security

Dating Recordings by Power Line Interference

Interesting: The capability, called "electrical network frequency analysis" (ENF), is now attracting interest from the FBI and is considered the exciting new frontier...

Reading Me
From Schneier on Security

Reading Me

The number of different ways to read my essays, commentaries, and links has grown recently. Here's the rundown: You can read my writings daily on my blog. These...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account