acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

EU Might Raise Fines for Data Breaches
From Schneier on Security

EU Might Raise Fines for Data Breaches

This makes a lot of sense. Viviane Reding dismissed recent fines for Google as "pocket money" and said the firm would have had to pay $1bn under her plans for...

SPARROW II: NSA Exploit of the Day
From Schneier on Security

SPARROW II: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SPARROW II (TS//SI//REL) An embedded computer system running BLINDDATE tools...

New Security Risks for Windows XP Systems
From Schneier on Security

New Security Risks for Windows XP Systems

Microsoft is trying to stop supporting Windows XP. The problem is that a majority of ATMs still use that OS. And once Microsoft stops issuing security updates...

Friday Squid Blogging: Giant Squid Caught by Japanese Fisherman
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught by Japanese Fisherman

It's big: 13 feet long. The fisherman was stunned to discover the giant squid trapped in his net, having been caught at a depth of around 70m, about two-thirds...

PHOTOANGLO: NSA Exploit of the Day
From Schneier on Security

PHOTOANGLO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PHOTOANGLO (TS//SI//REL TO USA,FVEY) PHOTOANGLO is a joint NSA/GCHQ project...

<i>Applied Cryptography</i> Available Online
From Schneier on Security

Applied Cryptography Available Online

I'm sure this is a pirated copy. Looking at it, it's amazing how long ago twenty years was.

Income Inequality as a Security Issue
From Schneier on Security

Income Inequality as a Security Issue

This is an interesting way to characterizing income inequality as a security issue: …growing inequality menaces vigorous societies. It is a proxy for how effectively...

NIGHTWATCH: NSA Exploit of the Day
From Schneier on Security

NIGHTWATCH: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTWATCH (TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...

Consumer Manipulation
From Schneier on Security

Consumer Manipulation

Tim Hartford talks about consumer manipulation: Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...

NIGHTSTAND: NSA Exploit of the Day
From Schneier on Security

NIGHTSTAND: NSA Exploit of the Day

Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog: NIGHTSTAND (TS//SI//REL) An active 802.11 wireless exploitation and injection...

Refrigerator Sending Spam Messages?
From Schneier on Security

Refrigerator Sending Spam Messages?

Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...

Questioning the Efficacy of NSA's Bulk-Collection Programs
From Schneier on Security

Questioning the Efficacy of NSA's Bulk-Collection Programs

Two reports have recently been published questioning the efficacy of the NSA's bulk-collection programs. The first one is from the left-leaning New American Foundation...

LOUDAUTO: NSA Exploit of the Day
From Schneier on Security

LOUDAUTO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: LOUDAUTO (TS//SI//REL TO USA,FVEY) Audio-based RF retro-reflector. Provides...

Adware Vendors Buy and Abuse Chrome Extensions
From Schneier on Security

Adware Vendors Buy and Abuse Chrome Extensions

This is not a good development: To make matters worse, ownership of a Chrome extension can be transferred to another party, and users are never informed when an...

CTX4000: NSA Exploit of the Day
From Schneier on Security

CTX4000: NSA Exploit of the Day

Today's device -- this one isn't an implant -- from the NSA's Tailored Access Operations (TAO) group implant catalog: CTX4000 (TS//SI//REL TO USA,FVEY) The CTX4000...

DDOS Attacks Using NTP
From Schneier on Security

DDOS Attacks Using NTP

This is new: The NTP method first began to appear late last year. To bring down a server such as one running "League of Legends," the attackers trick NTP servers...

Friday Squid Blogging: Camouflage in Squid Eyes
From Schneier on Security

Friday Squid Blogging: Camouflage in Squid Eyes

Interesting research: Cephalopods possess a sophisticated array of mechanisms to achieve camouflage in dynamic underwater environments. While active mechanisms...

PowerLocker uses Blowfish
From Schneier on Security

PowerLocker uses Blowfish

There's a new piece of ransomware out there, PowerLocker (also called PrisonLocker), that uses Blowfish: PowerLocker could prove an even more potent threat because...

STUCCOMONTANA: NSA Exploit of the Day
From Schneier on Security

STUCCOMONTANA: NSA Exploit of the Day

Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog: STUCCOMONTANA (TS//SI//REL) STUCCOMONTANA provides persistence for DNThere...

NSA-O-Matic
From Schneier on Security

NSA-O-Matic

Generate your own fake NSA programs.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account