acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

British Tourists Arrested in the U.S. for Tweeting
From Schneier on Security

British Tourists Arrested in the U.S. for Tweeting

Does this story make sense to anyone? The Department of Homeland Security flagged him as a potential threat when he posted an excited tweet to his pals about his...

The Nature of Cyberwar
From Schneier on Security

The Nature of Cyberwar

This was pretty good, I thought: However, it may be difficult to write military doctrine for many aspects of cyberconflict that are truly revolutionary. Here are...

Password Sharing Among American Teenagers
From Schneier on Security

Password Sharing Among American Teenagers

Interesting article from the New York Times on password sharing as a show of affection. "It's a sign of trust," Tiffany Carandang, a high school senior in Sandiscusses...

Evidence on the Effectiveness of Terrorism
From Schneier on Security

Evidence on the Effectiveness of Terrorism

Readers of this blog will know that I like the works of Max Abrams, and regularly blog them. He has a new paper (full paper behind paywall) in Defence and Peace...

Federal Judge Orders Defendant to Decrypt Laptop
From Schneier on Security

Federal Judge Orders Defendant to Decrypt Laptop

A U.S. federal judge has ordered a defendent to decrypt her laptop.

Supreme Court Rules that GPS Tracking Requires a Warrant
From Schneier on Security

Supreme Court Rules that GPS Tracking Requires a Warrant

The U.S Supreme Court has ruled that the police cannot attach a GPS tracking device to a car without a warrant.

Research into an Information Security Risk Rating
From Schneier on Security

Research into an Information Security Risk Rating

The NSF is funding research on giving organizations information-security risk ratings, similar to credit ratings for individuals: Existing risk management techniques...

Using Plant DNA for Authentication
From Schneier on Security

Using Plant DNA for Authentication

Turns out you can create unique signatures from plant DNA. The idea is to spray this stuff on military components in order to verify authentic items and detect...

Authentication by "Cognitive Footprint"
From Schneier on Security

Authentication by "Cognitive Footprint"

DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse...

The Continued Militarization of the U.S. Police
From Schneier on Security

The Continued Militarization of the U.S. Police

The state of Texas gets an armed PT boat. I guess armed drones weren't enough for them.

<i>The Onion</i> on Facebook
From Schneier on Security

The Onion on Facebook

Funny news video on Facebook and the CIA.

Using False Alarms to Disable Security
From Schneier on Security

Using False Alarms to Disable Security

I wrote about this technique in Beyond Fear: Beginning Sunday evening, the robbers intentionally set off the gallery's alarm system several times without entering...

Tor Opsec
From Schneier on Security

Tor Opsec

Good operational security guide to Tor.

The Importance of Good Backups
From Schneier on Security

The Importance of Good Backups

Thankfully, this doesn't happen very often: A US man who had been convicted on a second-degree murder charge will get a new trial after a computer virus destroyed...

Going Dark to Protest SOPA/PIPA
From Schneier on Security

Going Dark to Protest SOPA/PIPA

Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...

PCI Lawsuit
From Schneier on Security

PCI Lawsuit

This is a first: ...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...

Friday Squid Blogging: Argentina Attempts a Squid Blockage against the Falkland Islands
From Schneier on Security

Friday Squid Blogging: Argentina Attempts a Squid Blockage against the Falkland Islands

Yet another story that combines squid and security. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Recovering a Hacked Gmail Account
From Schneier on Security

Recovering a Hacked Gmail Account

Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...

"Going Dark" vs. a "Golden Age of Surveillance"
From Schneier on Security

"Going Dark" vs. a "Golden Age of Surveillance"

It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...

Abolish the Department of Homeland Security
From Schneier on Security

Abolish the Department of Homeland Security

I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account