acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tom Engelhardt on Fear on Terrorism
From Schneier on Security

Tom Engelhardt on Fear on Terrorism

Nice essay. Similar sentiment from Newsweek.

More on the Al-Madhouh Assassination
From Schneier on Security

More on the Al-Madhouh Assassination

Interesting essay by a former CIA field officer on the al-Mabhouh assassination: The truth is that Mr. Mabhouh's assassination was conducted according to the book...

Breaking in to Hotel Rooms
From Schneier on Security

Breaking in to Hotel Rooms

Is this how the al-Mabhouh assassins got in?

Friday Squid Blogging: Squid Homophone Lessons
From Schneier on Security

Friday Squid Blogging: Squid Homophone Lessons

Squids make great examples.

Me on Surveillance Cameras
From Schneier on Security

Me on Surveillance Cameras

My fourth essay for CNN.com, on surveillance cameras. The Al-Mabhouh assassination made a nice news hook.

Hitler and Cloud Computing
From Schneier on Security

Hitler and Cloud Computing

Funny video by Marcus Ranum and Gunnar Peterson.

Small Planes and Lone Terrorist Nutcases
From Schneier on Security

Small Planes and Lone Terrorist Nutcases

A Washington Post article concludes that small planes are not the next terror threat: Pilots of private planes fly about 200,000 small and medium-size aircraft...

Remotely Spying on Kids with School Laptops
From Schneier on Security

Remotely Spying on Kids with School Laptops

It's a really creepy story. A school issues laptops to students, and then remotely and surreptitiously turns on the camera. (Here's the lawsuit.) This is anLower...

NSA Historical Documents
From Schneier on Security

NSA Historical Documents

Just declassified: "A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service, 1931

The Doghouse: Demiurge Consulting
From Schneier on Security

The Doghouse: Demiurge Consulting

They claim to be "one of the nation's only and most respected security and intelligence providers" -- I've never heard of them -- but their blog consists entirely...

Mark Twain on Risk Analysis
From Schneier on Security

Mark Twain on Risk Analysis

From 1871: I hunted up statistics, and was amazed to find that after all the glaring newspaper headings concerning railroad disasters, less than three hundred...

Another Debit Card Skimmer
From Schneier on Security

Another Debit Card Skimmer

This one is installed inside gas pumps. There's nothing the customer can detect.

Friday Squid Blogging: Squid Socks
From Schneier on Security

Friday Squid Blogging: Squid Socks

Cute, but not really for me.

Cyber Shockwave Test
From Schneier on Security

Cyber Shockwave Test

There was a big U.S. cyberattack exercise this week. We didn't do a This is, I think, an eyewitness report.

Al-Mabhouh Assassination
From Schneier on Security

Al-Mabhouh Assassination

It reads like a very professional operation: Security footage of the killers' movements during the afternoon, released by police in Dubai yesterday, underlines...

Opening Locks with Foil Impressioning
From Schneier on Security

Opening Locks with Foil Impressioning

Interesting blog post, with video demonstration, about an improved tool to open high security locks with a key that will just "form itself" if you insert it into...

Bruce Schneier Facebook Page
From Schneier on Security

Bruce Schneier Facebook Page

I finally have control of my Facebook page. There'll be nothing on it that isn't on my blog, but some of you might prefer following my writing from there. (ITwitter...

Botnets Attacking Each Other
From Schneier on Security

Botnets Attacking Each Other

A new Trojan Horse named Spy Eye has code that kills Zeus, a rival botnet.  

Detecting Cheating by Analyzing Erased Answers
From Schneier on Security

Detecting Cheating by Analyzing Erased Answers

I had no idea this was being done, but erased answers are now analyzed on standardized tests. Schools with a high number of wrong-to-right changes across multiple...

James Fallows on the Chinese Cyber Threat
From Schneier on Security

James Fallows on the Chinese Cyber Threat

Interesting. I wrote this about Chinese cyberattacks in 2008.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account