acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The NSA's Patents
From Schneier on Security

The NSA's Patents

Here are all the NSA's patents, in one searchable database. If you find something good, tell us all in the comments....

The Fundamental Insecurity of USB
From Schneier on Security

The Fundamental Insecurity of USB

This is pretty impressive: Most of us learned long ago not to run executable files from sketchy USB sticks. But old-fashioned USB hygiene can't stop this newer...

Debit Card Override Hack
From Schneier on Security

Debit Card Override Hack

Clever: Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions...

The Costs of NSA Surveillance
From Schneier on Security

The Costs of NSA Surveillance

New America Foundation has a new paper on the costs of NSA surveillance: economic costs to US business, costs to US foreign policy, and costs to security. News...

Conference on Deception
From Schneier on Security

Conference on Deception

There was a conference on deception earlier this month. Sophie Van Der Zee has a summary of the sessions....

Russia Paying for a Tor Break
From Schneier on Security

Russia Paying for a Tor Break

Russia has put out a tender on its official government procurement website for anyone who can identify Tor users. The reward of $114,000 seems pretty cheap for...

Friday Squid Blogging: Build a Squid
From Schneier on Security

Friday Squid Blogging: Build a Squid

An interactive animation from the Museum of New Zealand Te Papa Tongarewa. As usual, you can also use this squid post to talk about the security stories in the...

Building a Legal Botnet in the Cloud
From Schneier on Security

Building a Legal Botnet in the Cloud

Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there's no reason this can't scale to much larger numbers...

Security Vulnerability in the Tails OS
From Schneier on Security

Security Vulnerability in the Tails OS

I'd like more information on this....

Securing the Nest Thermostat
From Schneier on Security

Securing the Nest Thermostat

A group of hackers are using a vulnerability in the Next thermostat to secure it against Nest's remote data collection....

Fingerprinting Computers By Making Them Draw Images
From Schneier on Security

Fingerprinting Computers By Making Them Draw Images

Here's a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly...

Friday Squid Blogging: Squid Dissection
From Schneier on Security

Friday Squid Blogging: Squid Dissection

A six-hour video of a giant squid dissection from Auckland University of Technology. As usual, you can also use this squid post to talk about the security stories...

NASDAQ Hack
From Schneier on Security

NASDAQ Hack

Long article on a sophisticated hacking of the NASDAQ stock exchange....

US National Guard is Getting Into Cyberwar
From Schneier on Security

US National Guard is Getting Into Cyberwar

The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...

Hackers Steal Personal Information of US Security-Clearance Holders
From Schneier on Security

Hackers Steal Personal Information of US Security-Clearance Holders

The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...

Security Against Traffic Analysis of Cloud Data Access
From Schneier on Security

Security Against Traffic Analysis of Cloud Data Access

Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....

Risks of Keyloggers on Public Computers
From Schneier on Security

Risks of Keyloggers on Public Computers

Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...

Legal Attacks Against Tor
From Schneier on Security

Legal Attacks Against Tor

Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...

GCHQ Catalog of Exploit Tools
From Schneier on Security

GCHQ Catalog of Exploit Tools

The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...

Studying Network Incident Response Teams Using Anthropological Methods
From Schneier on Security

Studying Network Incident Response Teams Using Anthropological Methods

This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account