acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

CANDYGRAM: NSA Exploit of the Day
From Schneier on Security

CANDYGRAM: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CANDYGRAM (S//SI//REL) Mimics GSM cell tower of a target network. Capable(S...

RCS Spyware and Citizen Lab
From Schneier on Security

RCS Spyware and Citizen Lab

Remote-Controlled System (RCS) is a piece of spyware sold exclusively to governments by a Milan company called Hacking Team. Recently, Citizen Lab found this spyware...

TOTEGHOSTLY 2.0: NSA Exploit of the Day
From Schneier on Security

TOTEGHOSTLY 2.0: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTEGHOSTLY 2.0 (TS//SI//REL) TOTEGHOSTLY 2.0 is STRAITBIZARRE based implant...

Debating Snowden's Actions
From Schneier on Security

Debating Snowden's Actions

It's the season. Here are two.

TOTECHASER: NSA Exploit of the Day
From Schneier on Security

TOTECHASER: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTECHASER (TS//SI//REL) TOTECHASER is a Windows CE implant targeting thehere...

What Information Are Stun Guns Recording?
From Schneier on Security

What Information Are Stun Guns Recording?

In a story about a stolen Stradivarius violin, there's this: Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for...

PICASSO: NSA Exploit of the Day
From Schneier on Security

PICASSO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PICASSO (S//SI//REL) Modified GSM (target) handset that collects user data...

US Infosec Researchers Against NSA Surveillance
From Schneier on Security

US Infosec Researchers Against NSA Surveillance

I signed an open letter from US researchers in cryptography and information security on NSA surveillance. It has received a lot of media coverage.

Who Should Store NSA Surveillance Data
From Schneier on Security

Who Should Store NSA Surveillance Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...

Friday Squid Blogging: Giant Squid TED Talk
From Schneier on Security

Friday Squid Blogging: Giant Squid TED Talk

Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

MONKEYCALENDAR: NSA Exploit of the Day
From Schneier on Security

MONKEYCALENDAR: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MONKEYCALENDAR (TS//SI//REL) MONKEYCALENDAR is a software implant for GSMhere...

My Talk on the NSA
From Schneier on Security

My Talk on the NSA

Earlier this month, I gave a talk about the NSA at MIT. The video is available. ETA: The video doesn't display on some Firefox browsers. If you have trouble,...

The Insecurity of Secret IT Systems
From Schneier on Security

The Insecurity of Secret IT Systems

We now know a lot about the security of the Rapiscan 522 B x-ray system used to scan carry-on baggage in airports worldwide. Billy Rios, director of threat intelligence...

GOPHERSET: NSA Exploit of the Day
From Schneier on Security

GOPHERSET: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GOPHERSET (TS//SI//REL) GOPHERSET is a software implant for GSM (Global System...

DROPOUTJEEP: NSA Exploit of the Day
From Schneier on Security

DROPOUTJEEP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: DROPOUTJEEP (TS//SI//REL) DROPOUTJEEP is a STRAITBIZARRE based software implant...

SURLYSPAWN: NSA Exploit of the Day
From Schneier on Security

SURLYSPAWN: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SURLYSPAWN (TS//SI//REL TO USA,FVEY) Data RF retro-reflector. Provides return...

DRM and the Law
From Schneier on Security

DRM and the Law

Cory Doctorow gives a good history of the intersection of Digital Rights Management (DRM) software and the law, describes how DRM software is antithetical to end...

"The Mask" Espionage Malware
From Schneier on Security

"The Mask" Espionage Malware

We’ve got a new nation-state espionage malware. "The Mask" was discovered by Kaspersky Labs: The primary targets are government institutions, diplomatic offices...

WISTFULTOLL: NSA Exploit of the Day
From Schneier on Security

WISTFULTOLL: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: WISTFULTOLL (TS//SI//REL) WISTFULTOLL is a UNITEDRAKE and STRAITBIZZARE plug...

NSA/GCHQ Accused of Hacking Belgian Cryptographer
From Schneier on Security

NSA/GCHQ Accused of Hacking Belgian Cryptographer

There has been a lot of news about Bengian cryptographer Jean-Jacques Quisquater having his computer hacked, and whether the NSA or GCHQ is to blame. It's a lot...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account