acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Legal Attacks Against Tor
From Schneier on Security

Legal Attacks Against Tor

Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...

GCHQ Catalog of Exploit Tools
From Schneier on Security

GCHQ Catalog of Exploit Tools

The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...

Studying Network Incident Response Teams Using Anthropological Methods
From Schneier on Security

Studying Network Incident Response Teams Using Anthropological Methods

This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...

Friday Squid Blogging: This Unmanned Drone Footage Will Blow Your Mind
From Schneier on Security

Friday Squid Blogging: This Unmanned Drone Footage Will Blow Your Mind

Neat video shot from a remote-operated vehicle. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

"Tips For Crafting A Strong Password That Really Pops"
From Schneier on Security

"Tips For Crafting A Strong Password That Really Pops"

Funny, and the inspiration for this week's headlines. (Note that the image shows Password Safe on the screen.) And marginally related, here's an odd essay about...

This Leaked NSA Memo Will Restore Your Faith in Humanity
From Schneier on Security

This Leaked NSA Memo Will Restore Your Faith in Humanity

Okay, it's a parody: The Russian Federation is more complex. At a political level there's a lot of grandstanding. Operationally though, we share intelligence with...

How Google Glass Snoops Steal Your Passcode
From Schneier on Security

How Google Glass Snoops Steal Your Passcode

Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated...

This Common Home Appliance Can Compromise Your Entire Security
From Schneier on Security

This Common Home Appliance Can Compromise Your Entire Security

LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...

NSA Spied on Prominent Muslim Americans
From Schneier on Security

NSA Spied on Prominent Muslim Americans

The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...

Here's How Brazilian Crooks Steal Billions
From Schneier on Security

Here's How Brazilian Crooks Steal Billions

Man-in-the-middle attack against a Brazilian payment system: Brazil has an extremely active and talented cybercrime underground, and increasingly Brazilian organized...

These Pickpocket Secrets Will Make You Cry
From Schneier on Security

These Pickpocket Secrets Will Make You Cry

Pickpocket tricks explained by neuroscience. So while sleight of hand helps, it's as much about capturing all of somebody's attention with other movements. Street...

The Simple Trick that Will Keep You Secure from Government Spies
From Schneier on Security

The Simple Trick that Will Keep You Secure from Government Spies

Last week, the German government arrested someone and charged him with spying for the US. Buried in one of the stories was a little bit of tradecraft. The US game...

NSA Employee Flees to Hong Kong -- You Won't Believe What Happens Next
From Schneier on Security

NSA Employee Flees to Hong Kong -- You Won't Believe What Happens Next

The latest story from the Snowden documents analyzes a large cache of intercepted conversations -- actual operational data -- and concludes that 90% of the individuals...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

Cute design. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Web Activity Used in Court to Portray State of Mind
From Schneier on Security

Web Activity Used in Court to Portray State of Mind

I don't care about the case, but look at this: "Among the details police have released is that Harris and his wife, Leanna, told them they conducted Internet searches...

NSA Targets Privacy Conscious for Surveillance
From Schneier on Security

NSA Targets Privacy Conscious for Surveillance

Jake Appelbaum et. al, are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites....

Goldman Sachs Demanding E-Mail be Deleted
From Schneier on Security

Goldman Sachs Demanding E-Mail be Deleted

Goldman Sachs is going to court to demand that Google retroactively delete an e-mail it accidentally sent. The breach occurred on June 23 and included "highly confidential...

Match Fixing in Soccer
From Schneier on Security

Match Fixing in Soccer

Useful primer....

How Traffic Shaping Can Help the NSA Evade Legal Oversight
From Schneier on Security

How Traffic Shaping Can Help the NSA Evade Legal Oversight

New research paper on how the NSA can evade legal prohibitions against collecting Internet data and metadata on Americans by forcing domestic traffic to leave and...

Blackphone
From Schneier on Security

Blackphone

First review of the secure Blackphone....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account