acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Research into an Information Security Risk Rating
From Schneier on Security

Research into an Information Security Risk Rating

The NSF is funding research on giving organizations information-security risk ratings, similar to credit ratings for individuals: Existing risk management techniques...

Using Plant DNA for Authentication
From Schneier on Security

Using Plant DNA for Authentication

Turns out you can create unique signatures from plant DNA. The idea is to spray this stuff on military components in order to verify authentic items and detect...

Authentication by "Cognitive Footprint"
From Schneier on Security

Authentication by "Cognitive Footprint"

DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse...

The Continued Militarization of the U.S. Police
From Schneier on Security

The Continued Militarization of the U.S. Police

The state of Texas gets an armed PT boat. I guess armed drones weren't enough for them.

<i>The Onion</i> on Facebook
From Schneier on Security

The Onion on Facebook

Funny news video on Facebook and the CIA.

Using False Alarms to Disable Security
From Schneier on Security

Using False Alarms to Disable Security

I wrote about this technique in Beyond Fear: Beginning Sunday evening, the robbers intentionally set off the gallery's alarm system several times without entering...

Tor Opsec
From Schneier on Security

Tor Opsec

Good operational security guide to Tor.

The Importance of Good Backups
From Schneier on Security

The Importance of Good Backups

Thankfully, this doesn't happen very often: A US man who had been convicted on a second-degree murder charge will get a new trial after a computer virus destroyed...

Going Dark to Protest SOPA/PIPA
From Schneier on Security

Going Dark to Protest SOPA/PIPA

Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...

PCI Lawsuit
From Schneier on Security

PCI Lawsuit

This is a first: ...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...

Friday Squid Blogging: Argentina Attempts a Squid Blockage against the Falkland Islands
From Schneier on Security

Friday Squid Blogging: Argentina Attempts a Squid Blockage against the Falkland Islands

Yet another story that combines squid and security. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Recovering a Hacked Gmail Account
From Schneier on Security

Recovering a Hacked Gmail Account

Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...

"Going Dark" vs. a "Golden Age of Surveillance"
From Schneier on Security

"Going Dark" vs. a "Golden Age of Surveillance"

It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...

Abolish the Department of Homeland Security
From Schneier on Security

Abolish the Department of Homeland Security

I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...

TSA Cupcake Update
From Schneier on Security

TSA Cupcake Update

The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.

A Theory of Online Jihadist Sites
From Schneier on Security

A Theory of Online Jihadist Sites

Very interesting: The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...

Apple Split-Key Patent
From Schneier on Security

Apple Split-Key Patent

Apple has a patent on splitting a key between a portable device and its power supply. Clever idea.

Protecting Your Privacy at International Borders
From Schneier on Security

Protecting Your Privacy at International Borders

The EFF has published a good guide. My own advice is here and here.

Collecting Expert Predictions about Terrorist Attacks
From Schneier on Security

Collecting Expert Predictions about Terrorist Attacks

John Mueller has been collecting them: Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...

Stealing Source Code
From Schneier on Security

Stealing Source Code

Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account