acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Week
authorschneier
bg-corner

Hacking Scientific Citations
From Schneier on Security

Hacking Scientific Citations

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking on “Reimagining Democracy in the Age of AI” at the Bozeman Library in Bozeman, Montana...

Friday Squid Blogging: 1994 Lair of Squid Game
From Schneier on Security

Friday Squid Blogging: 1994 Lair of Squid Game

I didn’t know: In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps...

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper
From Schneier on Security

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far)...

Apple Is Alerting iPhone Users of Spyware Attacks
From Schneier on Security

Apple Is Alerting iPhone Users of Spyware Attacks

Not a lot of details: Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks...

RADIUS Vulnerability
From Schneier on Security

RADIUS Vulnerability

New attack against the RADIUS authentication protocol: The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account