acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Octonaut
From Schneier on Security

Friday Squid Blogging: Octonaut

A space-traveling squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Diamond Swallowing as a Ruse
From Schneier on Security

Diamond Swallowing as a Ruse

It's a known theft tactic to swallow what you're stealing. It works for food at the supermarket, and it also can work for diamonds. Here's a twist on that tactic...

Friday Squid Blogging: Giant Squid Museum
From Schneier on Security

Friday Squid Blogging: Giant Squid Museum

In Valdés, Spain. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Schneier on Security</i> on <i>Elementary</i>
From Schneier on Security

Schneier on Security on Elementary

Two of my books can be seen in the background in CBS' new Sherlock Holmes drama, Elementary. A copy of Schneier on Security is prominently displayed on Sherlock...

Man-in-the-Middle Bank Fraud Attack
From Schneier on Security

Man-in-the-Middle Bank Fraud Attack

This sort of attack will become more common as banks require two-factor authentication: Tatanga checks the user account details including the number of accounts...

UGNazi
From Schneier on Security

UGNazi

Good article on the hacker group UGNazi.

Estimating the Probability of Another 9/11
From Schneier on Security

Estimating the Probability of Another 9/11

This statistical research says once per decade: Abstract: Quantities with right-skewed distributions are ubiquitous in complex social systems, including political...

Steganography in the Wild
From Schneier on Security

Steganography in the Wild

Steganographic information is embedded in World of Warcraft screen shots.

Stopping Terrorism
From Schneier on Security

Stopping Terrorism

Nice essay on the futility of trying to prevent another 9/11: "Never again." It is as simplistic as it is absurd. It is as vague as it is damaging. No two words...

A Real Movie-Plot Threat Contest
From Schneier on Security

A Real Movie-Plot Threat Contest

The "Australia's Security Nightmares: The National Security Short Story Competition" is part of Safeguarding Australia 2012. To aid the national security community...

New Attack Against Chip-and-Pin Systems
From Schneier on Security

New Attack Against Chip-and-Pin Systems

Well, new to us: You see, an EMV payment card authenticates itself with a MAC of transaction data, for which the freshly generated component is the unpredictable...

Security at the 9/11 WTC Memorial
From Schneier on Security

Security at the 9/11 WTC Memorial

There's a lot: Advance tickets are required to enter this public, outdoor memorial. To book them, you’re obliged to provide your home address, email address, and...

Another Stuxnet Post
From Schneier on Security

Another Stuxnet Post

Larry Constantine disputes David Stanger's book about Stuxnet: So, what did he get wrong? First of all, the Stuxnet worm did not escape into the wild. The analysis...

Friday Squid Blogging: Controlling Squid Chromatophores with Music
From Schneier on Security

Friday Squid Blogging: Controlling Squid Chromatophores with Music

Wacky. Other stories about the story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Hacking Marathon Races
From Schneier on Security

Hacking Marathon Races

Truly bizarre story of someone who seems to have figured out how to successfully cheat at marathons. The evidence of his cheating is overwhelming, but no one knows...

CSOs/CISOs Wanted: Cloud Security Questions
From Schneier on Security

CSOs/CISOs Wanted: Cloud Security Questions

I'm trying to separate cloud security hype from reality. To that end, I'd like to talk to a few big corporate CSOs or CISOs about their cloud security worries,...

Database of 12 Million Apple UDIDs Haked
From Schneier on Security

Database of 12 Million Apple UDIDs Haked

In this story, we learn that hackers got their hands on a database of 12 million Apple Apple Unique Device Identifiers (UDIDs) by hacking an FBI laptop. When I...

<i>Wall Street Journal</i> Review of <i>Liars and Outliers</i>
From Schneier on Security

Wall Street Journal Review of Liars and Outliers

Liars and Outliers (along with two other books: Kip Hawley's memoir of his time at the TSA and Against Security, by Harvey Molotch) has been reviewed in the Wall...

Hacking Brain-Computer Interfaces
From Schneier on Security

Hacking Brain-Computer Interfaces

In this fascinating piece of research, the question is asked: can we surreptitiously collect secret information from the brains of people using brain-computer interface...

Eye Twitch Patterns as a Biometric
From Schneier on Security

Eye Twitch Patterns as a Biometric

Yet another biometric: eye twitch patterns: ...a person's saccades, their tiny, but rapid, involuntary eye movements, can be measured using a video camera. The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account