acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

SOMBERKNAVE: NSA Exploit of the Day
From Schneier on Security

SOMBERKNAVE: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SOMBERKNAVE (TS//SI//REL) SOMBERKNAVE is Windows XP wireless software implant...

1971 Social Engineering Attack
From Schneier on Security

1971 Social Engineering Attack

From Betty Medsger's book on the 1971 FBI burglary (page 22): As burglars, they used some unusual techniques, ones Davidon enjoyed recalling years later, such...

MAESTRO-II: NSA Exploit of the Day
From Schneier on Security

MAESTRO-II: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MAESTRO-II (TS//SI//REL) MAESTRO-II is a miniaturized digital core packaged...

Hacking Airline Lounges for Free Meals
From Schneier on Security

Hacking Airline Lounges for Free Meals

I think this is a great hack: A man bought a first-class ticket and used it to have free meals and drinks at the airport's VIP lounge almost every day for nearly...

JUNIORMINT: NSA Exploit of the Day
From Schneier on Security

JUNIORMINT: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: JUNIORMINT (TS//SI//REL) JUNIORMINT is a digital core packaged in both a mini...

CSEC Surveillance Analysis of IP and User Data
From Schneier on Security

CSEC Surveillance Analysis of IP and User Data

The most recent story from the Snowden documents is from Canada: it claims the CSEC (Communications Security Establishment Canada) used airport Wi-Fi information...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

A T-shirt with a drawing of a squid reading. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

IRATEMONK: NSA Exploit of the Day
From Schneier on Security

IRATEMONK: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: IRATEMONK (TS//SI//REL) IRATEMONK provides software application persistence...

Another Credit-Card-as-Authentication Hack
From Schneier on Security

Another Credit-Card-as-Authentication Hack

This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...

HOWLERMONKEY: NSA Exploit of the Day
From Schneier on Security

HOWLERMONKEY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: HOWLERMONKEY (TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...

Side-Channel Attacks on Frog Calls
From Schneier on Security

Side-Channel Attacks on Frog Calls

The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...

Catalog of Snowden Revelations
From Schneier on Security

Catalog of Snowden Revelations

This looks to be very good. Add that to these three indexes of NSA source material, and these two summaries. This excellent parody website has a good collection...

GINSU: NSA Exploit of the Day
From Schneier on Security

GINSU: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GINSU (TS//SI//REL) GINSU provides software application persistence for the...

Trying to Value Online Privacy
From Schneier on Security

Trying to Value Online Privacy

Interesting paper: "The value of Online Privacy," by Scott Savage and Donald M. Waldman. Abstract: We estimate the value of online privacy with a differentiated...

The Politics of Fear
From Schneier on Security

The Politics of Fear

This is very good: ...one might suppose that modern democratic states, with the lessons of history at hand, would seek to minimize fear ­ or at least minimizeThey...

TAWDRYYARD: NSA Exploit of the Day
From Schneier on Security

TAWDRYYARD: NSA Exploit of the Day

Back in December, Der Spiegel published a lot of information about the NSA's Tailored Access Operations (TAO) group, including a 2008 catalog of hardware and software...

US Privacy and Civil Liberties Oversight Board (PCLOB) Condems NSA Mass Surveillance
From Schneier on Security

US Privacy and Civil Liberties Oversight Board (PCLOB) Condems NSA Mass Surveillance

Now we know why the president gave his speech on NSA surveillance last week; he wanted to get ahead of the Privacy and Civil Liberties Oversight Board. Last week...

EU Might Raise Fines for Data Breaches
From Schneier on Security

EU Might Raise Fines for Data Breaches

This makes a lot of sense. Viviane Reding dismissed recent fines for Google as "pocket money" and said the firm would have had to pay $1bn under her plans for...

SPARROW II: NSA Exploit of the Day
From Schneier on Security

SPARROW II: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SPARROW II (TS//SI//REL) An embedded computer system running BLINDDATE tools...

New Security Risks for Windows XP Systems
From Schneier on Security

New Security Risks for Windows XP Systems

Microsoft is trying to stop supporting Windows XP. The problem is that a majority of ATMs still use that OS. And once Microsoft stops issuing security updates...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account