acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

EBSR: NSA Exploit of the Day
From Schneier on Security

EBSR: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: EBSR (S//SI//REL) Multi-purpose, Pico class, tri-band active GSM base station...

Breaking Up the NSA
From Schneier on Security

Breaking Up the NSA

The NSA has become too big and too powerful. What was supposed to be a single agency with a dual mission -- protecting the security of U.S. communications and eavesdropping...

CYCLONE Hx9: NSA Exploit of the Day
From Schneier on Security

CYCLONE Hx9: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CYCLONE Hx9 (S//SI//FVEY) EGSM (900MGz) macro-class Network-In-a-Box (NIB)...

New Results in Software Obfuscation
From Schneier on Security

New Results in Software Obfuscation

Amit Sahai and others have some new results in software obfuscation. The papers are here. An over-the top Wired.com story on the research is here. And Matthew...

Friday Squid Blogging: Squid vs. Owlfish
From Schneier on Security

Friday Squid Blogging: Squid vs. Owlfish

This video is pretty fantastic: The narrator does a great job at explaining what's going on here, blow by gross blow, but here are the highlights: Black-eyed...

CROSSBEAM: NSA Exploit of the Day
From Schneier on Security

CROSSBEAM: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CROSSBEAM (TS//SI//REL) CROSSBEAM is a GSM module that mates a modified commercial...

Co3 Systems at the RSA Conference
From Schneier on Security

Co3 Systems at the RSA Conference

Co3 Systems is going to be at the RSA Conference. We don't have our own booth on the show floor, but there are four ways you can find us. Monday, we're at the...

Building an Online Lie Detector
From Schneier on Security

Building an Online Lie Detector

There's an interesting project to detect false rumors on the Internet. The EU-funded project aims to classify online rumours into four types: speculation -- such...

Brian Krebs
From Schneier on Security

Brian Krebs

Nice profile of Brian Krebs, cybersecurity journalist: Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks...

CANDYGRAM: NSA Exploit of the Day
From Schneier on Security

CANDYGRAM: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CANDYGRAM (S//SI//REL) Mimics GSM cell tower of a target network. Capable(S...

RCS Spyware and Citizen Lab
From Schneier on Security

RCS Spyware and Citizen Lab

Remote-Controlled System (RCS) is a piece of spyware sold exclusively to governments by a Milan company called Hacking Team. Recently, Citizen Lab found this spyware...

TOTEGHOSTLY 2.0: NSA Exploit of the Day
From Schneier on Security

TOTEGHOSTLY 2.0: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTEGHOSTLY 2.0 (TS//SI//REL) TOTEGHOSTLY 2.0 is STRAITBIZARRE based implant...

Debating Snowden's Actions
From Schneier on Security

Debating Snowden's Actions

It's the season. Here are two.

TOTECHASER: NSA Exploit of the Day
From Schneier on Security

TOTECHASER: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTECHASER (TS//SI//REL) TOTECHASER is a Windows CE implant targeting thehere...

What Information Are Stun Guns Recording?
From Schneier on Security

What Information Are Stun Guns Recording?

In a story about a stolen Stradivarius violin, there's this: Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for...

PICASSO: NSA Exploit of the Day
From Schneier on Security

PICASSO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PICASSO (S//SI//REL) Modified GSM (target) handset that collects user data...

US Infosec Researchers Against NSA Surveillance
From Schneier on Security

US Infosec Researchers Against NSA Surveillance

I signed an open letter from US researchers in cryptography and information security on NSA surveillance. It has received a lot of media coverage.

Who Should Store NSA Surveillance Data
From Schneier on Security

Who Should Store NSA Surveillance Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...

Friday Squid Blogging: Giant Squid TED Talk
From Schneier on Security

Friday Squid Blogging: Giant Squid TED Talk

Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

MONKEYCALENDAR: NSA Exploit of the Day
From Schneier on Security

MONKEYCALENDAR: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MONKEYCALENDAR (TS//SI//REL) MONKEYCALENDAR is a software implant for GSMhere...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account