acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Stabbing People with Stuff You Can Get Through Airport Security
From Schneier on Security

Stabbing People with Stuff You Can Get Through Airport Security

"Use of a pig model to demonstrate vulnerability of major neck vessels to inflicted trauma from common household items," from the American Journal of Forensic Medical...

How Smart are Islamic Terrorists?
From Schneier on Security

How Smart are Islamic Terrorists?

Organizational Learning and Islamic Militancy (May 2009) was written by Michael Kenney for the U.S. Department of Justice. It's long: 146 pages. From the executive...

Quantum Ghost Imaging
From Schneier on Security

Quantum Ghost Imaging

This is cool: Ghost imaging is a technique that allows a high-resolution camera to produce an image of an object that the camera itself cannot see. It uses two...

Secret Knock Lock
From Schneier on Security

Secret Knock Lock

Door lock that opens if you tap a particular rhythm.  

A Useful Side-Effect of Misplaced Fear
From Schneier on Security

A Useful Side-Effect of Misplaced Fear

A study in the British Journal of Criminology makes the point that drink-spiking date-raping is basically an urban legend: Abstract. There is a stark contrast...

Anti-Malware Detection and the Original Trojan Horse
From Schneier on Security

Anti-Malware Detection and the Original Trojan Horse

Funny.

Public Reactions to Terrorist Threats
From Schneier on Security

Public Reactions to Terrorist Threats

Interesting research: For the last five years we have researched the connection between times of terrorist threats and public opinion. In a series of tightly designed...

Bruce Schneier Action Figure
From Schneier on Security

Bruce Schneier Action Figure

A month ago, ThatsMyFace.com approached me about making a Bruce Schneier action figure. It's $100. I'd like to be able to say something like "half the proceeds...

Friday Squid Blogging: Sperm Whale Eating Giant Squid
From Schneier on Security

Friday Squid Blogging: Sperm Whale Eating Giant Squid

Rare photo.

Blowfish in Fiction
From Schneier on Security

Blowfish in Fiction

The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor. P. 495: The guy was using a fairly simple buffer overflow attack but withEvery...

Video Interview with Me
From Schneier on Security

Video Interview with Me

Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.

Beyond Security Theater
From Schneier on Security

Beyond Security Theater

[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...

FBI/CIA/NSA Information Sharing Before 9/11
From Schneier on Security

FBI/CIA/NSA Information Sharing Before 9/11

It's conventional wisdom that the legal "wall" between intelligence and law enforcement was one of the reasons we failed to prevent 9/11. The 9/11 Comission evaluated...

Security in a Reputation Economy
From Schneier on Security

Security in a Reputation Economy

In the past, our relationship with our computers was technical. We cared what CPU they had and what software they ran. We understood our networks and how they worked...

Hacking the Brazil Power Grid
From Schneier on Security

Hacking the Brazil Power Grid

We've seen lots of rumors about attacks against the power grid, both in the U.S. and elsewhere, of people hacking the power grid. Seems like the source of these...

Thieves Prefer Stealing Black Luggage
From Schneier on Security

Thieves Prefer Stealing Black Luggage

It's obvious why if you think about it: Thieves prefer to steal black luggage because so much of it looks alike. If the thief is caught red-handed by the bag's...

Protecting OSs from RootKits
From Schneier on Security

Protecting OSs from RootKits

Interesting research: "Countering Kernel Rootkits with Lightweight Hook Protection," by Zhi Wang, Xuxian Jiang, Weidong Cui, and and Peng Ning. Abstract: Kernel...

Is Antivirus Dead?
From Schneier on Security

Is Antivirus Dead?

Security is never black and white. If someone asks, "for best security, should I do A or B?" the answer almost invariably is both. But security is always a trade...

John Mueller on Zazi
From Schneier on Security

John Mueller on Zazi

I have refrained from commenting on the case against Najibullah Zazi, simply because it's so often the case that the details reported in the press have very little...

Laissez-Faire Access Control
From Schneier on Security

Laissez-Faire Access Control

Recently I wrote about the difficulty of making role-based access control work, and how reasearch at Dartmouth showed that it was better to let people take theThis...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account