acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Alan F. Westin Died
From Schneier on Security

Alan F. Westin Died

Obituary here. His 1967 book, Privacy and Freedom, almost single-handedly created modern privacy law.

How Complex Systems Fail
From Schneier on Security

How Complex Systems Fail

Good summary list. It's not directly about security, but it's all fundamentally about security. Any real-world security system is inherently complex. I wrote...

Security Lessons from the Battle of Hoth
From Schneier on Security

Security Lessons from the Battle of Hoth

Someone has analyzed the security mistakes in the Battle of Hoth, from the movie The Empire Strikes Back.

House Hearing: How Well Is the TSA Doing?
From Schneier on Security

House Hearing: How Well Is the TSA Doing?

I would have liked to participate in this hearing: Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency: "Assessing DHS 10 Years"...

Me at the RSA Conference
From Schneier on Security

Me at the RSA Conference

I'll be speaking twice at the RSA Conference this year. I'm giving a solo talk Tuesday at 1:00, and participating in a debate about training Wednesday at noon....

Another Essay about <i>Liars and Outliers</i>
From Schneier on Security

Another Essay about Liars and Outliers

The Montréal Review asked me to write an essay about my latest book. Not much that regular readers haven't seen before.

Friday Squid Blogging: Land Squids
From Schneier on Security

Friday Squid Blogging: Land Squids

Funny. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

I Was on <i>Inventing the Future</i>
From Schneier on Security

I Was on Inventing the Future

I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.

Hacking the Papal Election
From Schneier on Security

Hacking the Papal Election

As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...

All Those Companies that Can't Afford Dedicated Security
From Schneier on Security

All Those Companies that Can't Afford Dedicated Security

This is interesting: In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...

More on Chinese Cyberattacks
From Schneier on Security

More on Chinese Cyberattacks

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency...

Age Biases in Perceptions of Trust
From Schneier on Security

Age Biases in Perceptions of Trust

Interesting research (full article is behind a paywall): Abstract: Older adults are disproportionately vulnerable to fraud, and federal agencies have speculated...

Cheating at Chess
From Schneier on Security

Cheating at Chess

Good summary of cheating in tournament chess.

Fixing Soccer Matches
From Schneier on Security

Fixing Soccer Matches

How international soccer matches are fixed. Right now, Dan Tan's programmers are busy reverse-engineering the safeguards of online betting houses. About $3 billion...

19th-Century Traffic Analysis
From Schneier on Security

19th-Century Traffic Analysis

There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...

Hacking Citation Counts
From Schneier on Security

Hacking Citation Counts

Hacking citation counts using Google Scholar.

More State-Sponsored Hacking
From Schneier on Security

More State-Sponsored Hacking

After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...

Automobile Data Surveillance and the Future of Black Boxes
From Schneier on Security

Automobile Data Surveillance and the Future of Black Boxes

Tesla Motors gave one of its electric cars to John Broder, a very outspoken electric-car skeptic from the New York Times, for a test drive. After a negative review...

Friday Squid Blogging: More on Flying Squid
From Schneier on Security

Friday Squid Blogging: More on Flying Squid

Japanese squid researchers have confirmed flying squid can fly, and how they do it. (Note: I have written about flying squid before.) As usual, you can also use...

Jacob Appelbaum's 29C3 Keynote Speech
From Schneier on Security

Jacob Appelbaum's 29C3 Keynote Speech

This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account