acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

US National Guard is Getting Into Cyberwar
From Schneier on Security

US National Guard is Getting Into Cyberwar

The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...

Hackers Steal Personal Information of US Security-Clearance Holders
From Schneier on Security

Hackers Steal Personal Information of US Security-Clearance Holders

The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...

Security Against Traffic Analysis of Cloud Data Access
From Schneier on Security

Security Against Traffic Analysis of Cloud Data Access

Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....

Risks of Keyloggers on Public Computers
From Schneier on Security

Risks of Keyloggers on Public Computers

Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...

Legal Attacks Against Tor
From Schneier on Security

Legal Attacks Against Tor

Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...

GCHQ Catalog of Exploit Tools
From Schneier on Security

GCHQ Catalog of Exploit Tools

The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...

Studying Network Incident Response Teams Using Anthropological Methods
From Schneier on Security

Studying Network Incident Response Teams Using Anthropological Methods

This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...

Friday Squid Blogging: This Unmanned Drone Footage Will Blow Your Mind
From Schneier on Security

Friday Squid Blogging: This Unmanned Drone Footage Will Blow Your Mind

Neat video shot from a remote-operated vehicle. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

"Tips For Crafting A Strong Password That Really Pops"
From Schneier on Security

"Tips For Crafting A Strong Password That Really Pops"

Funny, and the inspiration for this week's headlines. (Note that the image shows Password Safe on the screen.) And marginally related, here's an odd essay about...

This Leaked NSA Memo Will Restore Your Faith in Humanity
From Schneier on Security

This Leaked NSA Memo Will Restore Your Faith in Humanity

Okay, it's a parody: The Russian Federation is more complex. At a political level there's a lot of grandstanding. Operationally though, we share intelligence with...

How Google Glass Snoops Steal Your Passcode
From Schneier on Security

How Google Glass Snoops Steal Your Passcode

Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated...

This Common Home Appliance Can Compromise Your Entire Security
From Schneier on Security

This Common Home Appliance Can Compromise Your Entire Security

LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...

NSA Spied on Prominent Muslim Americans
From Schneier on Security

NSA Spied on Prominent Muslim Americans

The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...

Here's How Brazilian Crooks Steal Billions
From Schneier on Security

Here's How Brazilian Crooks Steal Billions

Man-in-the-middle attack against a Brazilian payment system: Brazil has an extremely active and talented cybercrime underground, and increasingly Brazilian organized...

These Pickpocket Secrets Will Make You Cry
From Schneier on Security

These Pickpocket Secrets Will Make You Cry

Pickpocket tricks explained by neuroscience. So while sleight of hand helps, it's as much about capturing all of somebody's attention with other movements. Street...

The Simple Trick that Will Keep You Secure from Government Spies
From Schneier on Security

The Simple Trick that Will Keep You Secure from Government Spies

Last week, the German government arrested someone and charged him with spying for the US. Buried in one of the stories was a little bit of tradecraft. The US game...

NSA Employee Flees to Hong Kong -- You Won't Believe What Happens Next
From Schneier on Security

NSA Employee Flees to Hong Kong -- You Won't Believe What Happens Next

The latest story from the Snowden documents analyzes a large cache of intercepted conversations -- actual operational data -- and concludes that 90% of the individuals...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

Cute design. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Web Activity Used in Court to Portray State of Mind
From Schneier on Security

Web Activity Used in Court to Portray State of Mind

I don't care about the case, but look at this: "Among the details police have released is that Harris and his wife, Leanna, told them they conducted Internet searches...

NSA Targets Privacy Conscious for Surveillance
From Schneier on Security

NSA Targets Privacy Conscious for Surveillance

Jake Appelbaum et. al, are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account