acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

NIGHTSTAND: NSA Exploit of the Day
From Schneier on Security

NIGHTSTAND: NSA Exploit of the Day

Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTSTAND (TS//SI//REL) An active 802.11 wireless exploitation and injection...

Refrigerator Sending Spam Messages?
From Schneier on Security

Refrigerator Sending Spam Messages?

Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...

Questioning the Efficacy of NSA's Bulk-Collection Programs
From Schneier on Security

Questioning the Efficacy of NSA's Bulk-Collection Programs

Two reports have recently been published questioning the efficacy of the NSA's bulk-collection programs. The first one is from the left-leaning New American Foundation...

LOUDAUTO: NSA Exploit of the Day
From Schneier on Security

LOUDAUTO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: LOUDAUTO (TS//SI//REL TO USA,FVEY) Audio-based RF retro-reflector. Provides...

Adware Vendors Buy and Abuse Chrome Extensions
From Schneier on Security

Adware Vendors Buy and Abuse Chrome Extensions

This is not a good development: To make matters worse, ownership of a Chrome extension can be transferred to another party, and users are never informed when an...

CTX4000: NSA Exploit of the Day
From Schneier on Security

CTX4000: NSA Exploit of the Day

Today's device -- this one isn't an implant -- from the NSA's Tailored Access Operations (TAO) group implant catalog: CTX4000 (TS//SI//REL TO USA,FVEY) The CTX4000...

DDOS Attacks Using NTP
From Schneier on Security

DDOS Attacks Using NTP

This is new: The NTP method first began to appear late last year. To bring down a server such as one running "League of Legends," the attackers trick NTP servers...

Friday Squid Blogging: Camouflage in Squid Eyes
From Schneier on Security

Friday Squid Blogging: Camouflage in Squid Eyes

Interesting research: Cephalopods possess a sophisticated array of mechanisms to achieve camouflage in dynamic underwater environments. While active mechanisms...

PowerLocker uses Blowfish
From Schneier on Security

PowerLocker uses Blowfish

There's a new piece of ransomware out there, PowerLocker (also called PrisonLocker), that uses Blowfish: PowerLocker could prove an even more potent threat because...

STUCCOMONTANA: NSA Exploit of the Day
From Schneier on Security

STUCCOMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: STUCCOMONTANA (TS//SI//REL) STUCCOMONTANA provides persistence for DNThere...

NSA-O-Matic
From Schneier on Security

NSA-O-Matic

Generate your own fake NSA programs.

NSA Collects Hundreds of Millions of Text Messages Daily
From Schneier on Security

NSA Collects Hundreds of Millions of Text Messages Daily

No surprise here. Although we some new codenames: DISHFIRE: The NSA's program to collect text messages and text-message metadata. PREFER: The NSA's program to...

SIERRAMONTANA: NSA Exploit of the Day
From Schneier on Security

SIERRAMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SIERRAMONTANA (TS//SI//REL) SIERRAMONTANA provides persistence for DNThere...

Today I Briefed Congress on the NSA
From Schneier on Security

Today I Briefed Congress on the NSA

This morning I spent an hour in a closed room with six Members of Congress: Rep. Logfren, Rep. Sensenbrenner, Rep. Scott, Rep. Goodlate, Rep Thompson, and Rep....

Edward Elgar's Ciphers
From Schneier on Security

Edward Elgar's Ciphers

Elgar's cryptography puzzles from the late 1890s.

Cell Phone Tracking by Non-State Actors
From Schneier on Security

Cell Phone Tracking by Non-State Actors

This is interesting: Adding credence to the theory that Brooklyn landlord Menachem Stark was kidnapped and murdered by professionals, a law enforcement source ...

SCHOOLMONTANA: NSA Exploit of the Day
From Schneier on Security

SCHOOLMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: SCHOOLMONTANA (TS//SI//REL) SCHOOLMONTANA provides persistence for DNThere...

The Changing Cost of Surveillance
From Schneier on Security

The Changing Cost of Surveillance

From Ashkan Soltani's blog post: The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the ...

HEADWATER: NSA Exploit of the Day
From Schneier on Security

HEADWATER: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: HEADWATER (TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth
From Schneier on Security

Debunking the "NSA Mass Surveillance Could Have Stopped 9/11" Myth

It's something that we're hearing a lot, both from NSA Director General Keith Alexander and others: the NSA's mass surveillance programs could have stopped 9/11...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account