acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Over $3M in Prizes to Hack Google Chrome
From Schneier on Security

Over $3M in Prizes to Hack Google Chrome

Google's contest at the CanSecWest conference: Today we’re announcing our third Pwnium competition­Pwnium 3. Google Chrome is already featured in the Pwn2Own competition...

Why Is Quantum Computing So Hard?
From Schneier on Security

Why Is Quantum Computing So Hard?

Blog post (and two papers) by Ross Anderson and Robert Brady. News article.

<i>New York Times</i> Hacked by China
From Schneier on Security

New York Times Hacked by China

This was big news last week, and I spent a lot of time doing press interviews about it. But while it is an important story -- hacking a newspaper, looking forGhostNet...

Anti-Drone Clothing
From Schneier on Security

Anti-Drone Clothing

Clothing designed to thwart drones.

Proactive Defense Papers
From Schneier on Security

Proactive Defense Papers

I just printed this out: "Proactive Defense for Evolving Cyber Threats," a Sandia Report by Richard Colbaugh and Kristin Glass. It's a collection of academic...

Security Seals
From Schneier on Security

Security Seals

I don't see a lot written about security seals, despite how common they are. This article is a very basic overview of the technologies.

Using Imagery to Avoid Censorship
From Schneier on Security

Using Imagery to Avoid Censorship

Interesting: "It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...

Friday Squid Blogging: Squid Anchor
From Schneier on Security

Friday Squid Blogging: Squid Anchor

Webpage says that it's "the most effective lightweight, portable anchor around." As usual, you can also use this squid post to talk about the security stories...

Pentagon Staffs Up U.S. Cyber Command
From Schneier on Security

Pentagon Staffs Up U.S. Cyber Command

The Washington Post has the story: The move, requested by the head of the Defense Department's Cyber Command, is part of an effort to turn an organization that...

Jared Diamond on Common Risks
From Schneier on Security

Jared Diamond on Common Risks

Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...

The Eavesdropping System in Your Computer
From Schneier on Security

The Eavesdropping System in Your Computer

Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard: The ...

Power and the Internet
From Schneier on Security

Power and the Internet

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...

"People, Process, and Technology"
From Schneier on Security

"People, Process, and Technology"

Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...

Who Does Skype Let Spy?
From Schneier on Security

Who Does Skype Let Spy?

Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...

Backdoors Built in to Barracuda Networks Equipment
From Schneier on Security

Backdoors Built in to Barracuda Networks Equipment

Don't we know enough not to do this anymore?

Complexity and Security
From Schneier on Security

Complexity and Security

I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this: Results showed...

Dangerous Security Theater: Scrambling Fighter Jets
From Schneier on Security

Dangerous Security Theater: Scrambling Fighter Jets

This story exemplifies everything that's wrong with our see-something-say-something war on terror: a perfectly innocent person on an airplane, a random person identifying...

Violence as a Contagious Disease
From Schneier on Security

Violence as a Contagious Disease

This is fascinating: Intuitively we understand that people surrounded by violence are more likely to be violent themselves. This isn't just some nebulous phenomenon...

Friday Squid Blogging: Squirming Tentacle USB Drive
From Schneier on Security

Friday Squid Blogging: Squirming Tentacle USB Drive

Just the thing. (Note that this is different than the previous squid USB drive I blogged about.) As usual, you can also use this squid post to talk about the...

Video Interview with Me
From Schneier on Security

Video Interview with Me

This interview was conducted last month, at an artificial intelligence conference at Oxford.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account