acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

My Talk on the NSA
From Schneier on Security

My Talk on the NSA

Earlier this month, I gave a talk about the NSA at MIT. The video is available. ETA: The video doesn't display on some Firefox browsers. If you have trouble,...

The Insecurity of Secret IT Systems
From Schneier on Security

The Insecurity of Secret IT Systems

We now know a lot about the security of the Rapiscan 522 B x-ray system used to scan carry-on baggage in airports worldwide. Billy Rios, director of threat intelligence...

GOPHERSET: NSA Exploit of the Day
From Schneier on Security

GOPHERSET: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GOPHERSET (TS//SI//REL) GOPHERSET is a software implant for GSM (Global System...

DROPOUTJEEP: NSA Exploit of the Day
From Schneier on Security

DROPOUTJEEP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: DROPOUTJEEP (TS//SI//REL) DROPOUTJEEP is a STRAITBIZARRE based software implant...

SURLYSPAWN: NSA Exploit of the Day
From Schneier on Security

SURLYSPAWN: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SURLYSPAWN (TS//SI//REL TO USA,FVEY) Data RF retro-reflector. Provides return...

DRM and the Law
From Schneier on Security

DRM and the Law

Cory Doctorow gives a good history of the intersection of Digital Rights Management (DRM) software and the law, describes how DRM software is antithetical to end...

"The Mask" Espionage Malware
From Schneier on Security

"The Mask" Espionage Malware

We’ve got a new nation-state espionage malware. "The Mask" was discovered by Kaspersky Labs: The primary targets are government institutions, diplomatic offices...

WISTFULTOLL: NSA Exploit of the Day
From Schneier on Security

WISTFULTOLL: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: WISTFULTOLL (TS//SI//REL) WISTFULTOLL is a UNITEDRAKE and STRAITBIZZARE plug...

NSA/GCHQ Accused of Hacking Belgian Cryptographer
From Schneier on Security

NSA/GCHQ Accused of Hacking Belgian Cryptographer

There has been a lot of news about Bengian cryptographer Jean-Jacques Quisquater having his computer hacked, and whether the NSA or GCHQ is to blame. It's a lot...

Friday Squid Blogging: Radioactive Giant Squid Washes Ashore in California
From Schneier on Security

Friday Squid Blogging: Radioactive Giant Squid Washes Ashore in California

Uh oh. And the real story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

TRINITY: NSA Exploit of the Day
From Schneier on Security

TRINITY: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TRINITY (TS//SI//REL) TRINITY is a miniaturized digital core packaged in a...

Another Fake NSA Codename Generator
From Schneier on Security

Another Fake NSA Codename Generator

Generate your own fake TAO implant. This is even more fun than the fake NSA program generator. Sadly, the NSA will probably use these to help develop their R&D...

SWAP: NSA Exploit of the Day
From Schneier on Security

SWAP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SWAP (TS//SI//REL) SWAP provides software application persistence by exploiting...

Dispute Resolution Systems for Security Protocols
From Schneier on Security

Dispute Resolution Systems for Security Protocols

Interesting paper by Steven J. Murdoch and Ross Anderson in this year's Financial Cryptography conference: "Security Protocols and Evidence: Where Many Payment."...

SOMBERKNAVE: NSA Exploit of the Day
From Schneier on Security

SOMBERKNAVE: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SOMBERKNAVE (TS//SI//REL) SOMBERKNAVE is Windows XP wireless software implant...

1971 Social Engineering Attack
From Schneier on Security

1971 Social Engineering Attack

From Betty Medsger's book on the 1971 FBI burglary (page 22): As burglars, they used some unusual techniques, ones Davidon enjoyed recalling years later, such...

MAESTRO-II: NSA Exploit of the Day
From Schneier on Security

MAESTRO-II: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MAESTRO-II (TS//SI//REL) MAESTRO-II is a miniaturized digital core packaged...

Hacking Airline Lounges for Free Meals
From Schneier on Security

Hacking Airline Lounges for Free Meals

I think this is a great hack: A man bought a first-class ticket and used it to have free meals and drinks at the airport's VIP lounge almost every day for nearly...

JUNIORMINT: NSA Exploit of the Day
From Schneier on Security

JUNIORMINT: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: JUNIORMINT (TS//SI//REL) JUNIORMINT is a digital core packaged in both a mini...

CSEC Surveillance Analysis of IP and User Data
From Schneier on Security

CSEC Surveillance Analysis of IP and User Data

The most recent story from the Snowden documents is from Canada: it claims the CSEC (Communications Security Establishment Canada) used airport Wi-Fi information...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account