acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

An Open Letter to IBM's Open Letter
From Schneier on Security

An Open Letter to IBM's Open Letter

Last week, IBM published an "open letter" about "government access to data," where it tried to assure its customers that it's not handing everything over to the...

Liveblogging the Financial Cryptography Conference
From Schneier on Security

Liveblogging the Financial Cryptography Conference

Ross Anderson liveblogged Financial Cryptography 2014. Interesting stuff....

Friday Squid Blogging: Bobtail Squid Photos
From Schneier on Security

Friday Squid Blogging: Bobtail Squid Photos

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

NEBULA: NSA Exploit of the Day
From Schneier on Security

NEBULA: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: NEBULA (S//SI//FVEY) Multi-Protocol macro-class Network-In-a-Box (NIB) system...

Decoding the Voynich Manuscript
From Schneier on Security

Decoding the Voynich Manuscript

The Voynich Manuscript has been partially decoded. This seems not to be a hoax. And the manuscript seems not to be a hoax, either. Here's the paper.

GENESIS: NSA Exploit of the Day
From Schneier on Security

GENESIS: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GENESIS (S//SI//REL) Commercial GSM handset that has been modified to include...

Was the iOS SSL Flaw Deliberate?
From Schneier on Security

Was the iOS SSL Flaw Deliberate?

Last October, I speculated on the best ways to go about designing and implementing a software backdoor. I suggested three characteristics of a good backdoor: low...

ENTOURAGE: NSA Exploit of the Day
From Schneier on Security

ENTOURAGE: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: ENTOURAGE (S//SI//REL) Direction Finding application operating on the HOLLOWPOINT...

DDoSing a Cell Phone Network
From Schneier on Security

DDoSing a Cell Phone Network

Interesting research: Abstract: The HLR/AuC is considered to be one of the most important network elements of a 3G network. It can serve up to five million subscribers...

EBSR: NSA Exploit of the Day
From Schneier on Security

EBSR: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: EBSR (S//SI//REL) Multi-purpose, Pico class, tri-band active GSM base station...

Breaking Up the NSA
From Schneier on Security

Breaking Up the NSA

The NSA has become too big and too powerful. What was supposed to be a single agency with a dual mission -- protecting the security of U.S. communications and eavesdropping...

CYCLONE Hx9: NSA Exploit of the Day
From Schneier on Security

CYCLONE Hx9: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CYCLONE Hx9 (S//SI//FVEY) EGSM (900MGz) macro-class Network-In-a-Box (NIB)...

New Results in Software Obfuscation
From Schneier on Security

New Results in Software Obfuscation

Amit Sahai and others have some new results in software obfuscation. The papers are here. An over-the top Wired.com story on the research is here. And Matthew...

Friday Squid Blogging: Squid vs. Owlfish
From Schneier on Security

Friday Squid Blogging: Squid vs. Owlfish

This video is pretty fantastic: The narrator does a great job at explaining what's going on here, blow by gross blow, but here are the highlights: Black-eyed...

CROSSBEAM: NSA Exploit of the Day
From Schneier on Security

CROSSBEAM: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CROSSBEAM (TS//SI//REL) CROSSBEAM is a GSM module that mates a modified commercial...

Co3 Systems at the RSA Conference
From Schneier on Security

Co3 Systems at the RSA Conference

Co3 Systems is going to be at the RSA Conference. We don't have our own booth on the show floor, but there are four ways you can find us. Monday, we're at the...

Building an Online Lie Detector
From Schneier on Security

Building an Online Lie Detector

There's an interesting project to detect false rumors on the Internet. The EU-funded project aims to classify online rumours into four types: speculation -- such...

Brian Krebs
From Schneier on Security

Brian Krebs

Nice profile of Brian Krebs, cybersecurity journalist: Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks...

CANDYGRAM: NSA Exploit of the Day
From Schneier on Security

CANDYGRAM: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CANDYGRAM (S//SI//REL) Mimics GSM cell tower of a target network. Capable(S...

RCS Spyware and Citizen Lab
From Schneier on Security

RCS Spyware and Citizen Lab

Remote-Controlled System (RCS) is a piece of spyware sold exclusively to governments by a Milan company called Hacking Team. Recently, Citizen Lab found this spyware...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account