acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

How to Become a Nuclear Power
From Schneier on Security

How to Become a Nuclear Power

Sarcastic, yet a bit too close to the truth.

Natural Language Shellcode
From Schneier on Security

Natural Language Shellcode

Nice: In this paper we revisit the assumption that shellcode need be fundamentally different in structure than non-executable data. Specifically, we elucidate...

Acrobatic Thieves
From Schneier on Security

Acrobatic Thieves

Some movie-plot attacks actually happen: They never touched the floor

Dead on the No-Fly List
From Schneier on Security

Dead on the No-Fly List

Such "logic": If a person on the no-fly list dies, his name could stay on the list so that the government can catch anyone trying to assume his identity. Butanyone's...

New Book: <i>Cryptography Engineering</i>
From Schneier on Security

New Book: Cryptography Engineering

I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...

Electronic Health Record Security Analysis
From Schneier on Security

Electronic Health Record Security Analysis

In British Columbia: When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...

Back Door in Battery Charger
From Schneier on Security

Back Door in Battery Charger

Amazing: The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...

PDF the Most Common Malware Vector
From Schneier on Security

PDF the Most Common Malware Vector

MS Word has been dethroned: Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...

Even More on the al-Mabhouh Assassination
From Schneier on Security

Even More on the al-Mabhouh Assassination

This, from a former CIA chief of station: The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...

Friday Squid Blogging: Preserving Your Giant Squid
From Schneier on Security

Friday Squid Blogging: Preserving Your Giant Squid

Plastination: For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...

Bringing Lots of Liquids on a Plane at Schiphol
From Schneier on Security

Bringing Lots of Liquids on a Plane at Schiphol

This would worry me, if the liquid ban weren't already useless. The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...

Security Trade-Offs and Sacred Values
From Schneier on Security

Security Trade-Offs and Sacred Values

Interesting research: Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...

Disabling Cars by Remote Control
From Schneier on Security

Disabling Cars by Remote Control

Who didn't see this coming? More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...

Casino Hack
From Schneier on Security

Casino Hack

Nice http://www.casinocitytimes.com/news/article/computer-experts-stole-

Secret Questions
From Schneier on Security

Secret Questions

Interesting research: Analysing our data for security, though, shows that essentially all human-generated names provide poor resistance to guessing. For an attacker...

USB Combination Lock
From Schneier on Security

USB Combination Lock

Here's a promotional security product designed by someone who knows nothing about security. The USB drive is "protected" by a combination lock. There are only...

Typosquatting
From Schneier on Security

Typosquatting

"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman: Abstract. We describe a method for identifying "typosquatting",...

Friday Squid Blogging: Cipherlopods
From Schneier on Security

Friday Squid Blogging: Cipherlopods

This makes no sense to me, even though -- I suppose -- it's a squid cryptography joke.

Another Schneier Interview
From Schneier on Security

Another Schneier Interview

This one on simple-talk.com.

Why DRM Doesn't Work
From Schneier on Security

Why DRM Doesn't Work

Funny comic.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account