acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

More Data on Attributing the Sony Attack
From Schneier on Security

More Data on Attributing the Sony Attack

An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds -- which implies an insider. Our Gotnews.com investigation...

Leaked CIA Documents
From Schneier on Security

Leaked CIA Documents

I haven't seen much press mention about the leaked CIA documents that have appeared on Wikileaks this month. There are three: The CIA review of high-value target...

New Documents on NSA's Crypanalysis Capabilities
From Schneier on Security

New Documents on NSA's Crypanalysis Capabilities

Spiegel published a long article today on the NSA's analysis capabilities against encrypted systems, with a lot of new documents from the Snowden archive. I'm not...

Friday Squid Blogging: Mummers Play Featuring Giant Squid
From Schneier on Security

Friday Squid Blogging: Mummers Play Featuring Giant Squid

"St. George, the Dragon, and the Squid: A Preservation Mumming," by the American Folklife Center. As usual, you can also use this squid post to talk about the security...

Merry Christmas from the NSA
From Schneier on Security

Merry Christmas from the NSA

On Christmas eve the NSA relesed a bunch of audit reports on illegal spying using EO 12333 from 2001 to 2013. Bloomberg article. The heavily-redacted reports include...

"Santa Claus and the Surveillance State"
From Schneier on Security

"Santa Claus and the Surveillance State"

He sees you when you're sleeping. He knows when you're awake. He's everywhere. And that's the whole point of the Elf on the Shelf, the bright-eyed, Kewpie-esque...

Did North Korea Really Attack Sony?
From Schneier on Security

Did North Korea Really Attack Sony?

I am deeply skeptical of the FBI's announcement on Friday that North Korea was behind last month's Sony hack. The agency's evidence is tenuous, and I have a hard...

Manipulating Juries with PowerPoint
From Schneier on Security

Manipulating Juries with PowerPoint

Interesting article on the subconscious visual tricks used to manipulate juries and affect verdicts. In December 2012 the Washington Supreme Court threw out Glasmann's...

North Korea DDoSed Off the Internet
From Schneier on Security

North Korea DDoSed Off the Internet

North Korea has been knocked off the Internet by a distributed denial-of-service (DDoS) attack. Maybe the US did it, and maybe not. This whole incident is a perfect...

2008 Cyberattack Against Turkish Oil Pipeline
From Schneier on Security

2008 Cyberattack Against Turkish Oil Pipeline

Interesting article talks about the 2008 cyberattack against a Turkish oil pipeline: For western intelligence agencies, the blowout was a watershed event. Hackers...

Reacting to the Sony Hack
From Schneier on Security

Reacting to the Sony Hack

First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is...

Friday Squid Blogging: Squid Beard
From Schneier on Security

Friday Squid Blogging: Squid Beard

Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Lessons from the Sony Hack
From Schneier on Security

Lessons from the Sony Hack

Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...

SS7 Vulnerabilities
From Schneier on Security

SS7 Vulnerabilities

There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into...

ISIS Cyberattacks
From Schneier on Security

ISIS Cyberattacks

Citizen Lab has a new report on a probable ISIS-launched cyberattack: This report describes a malware attack with circumstantial links to the Islamic State in Iraq...

The Limits of Police Subterfuge
From Schneier on Security

The Limits of Police Subterfuge

"The next time you call for assistance because the Internet service in your home is not working, the 'technician' who comes to your door may actually be an undercover...

How the FBI Unmasked Tor Users
From Schneier on Security

How the FBI Unmasked Tor Users

Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....

Fake Cell Towers Found in Norway
From Schneier on Security

Fake Cell Towers Found in Norway

In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...

Understanding Zero-Knowledge Proofs
From Schneier on Security

Understanding Zero-Knowledge Proofs

Matthew Green has a good primer....

Over 700 Million People Taking Steps to Avoid NSA Surveillance
From Schneier on Security

Over 700 Million People Taking Steps to Avoid NSA Surveillance

There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account