acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Building an Online Lie Detector
From Schneier on Security

Building an Online Lie Detector

There's an interesting project to detect false rumors on the Internet. The EU-funded project aims to classify online rumours into four types: speculation -- such...

Brian Krebs
From Schneier on Security

Brian Krebs

Nice profile of Brian Krebs, cybersecurity journalist: Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks...

CANDYGRAM: NSA Exploit of the Day
From Schneier on Security

CANDYGRAM: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CANDYGRAM (S//SI//REL) Mimics GSM cell tower of a target network. Capable(S...

RCS Spyware and Citizen Lab
From Schneier on Security

RCS Spyware and Citizen Lab

Remote-Controlled System (RCS) is a piece of spyware sold exclusively to governments by a Milan company called Hacking Team. Recently, Citizen Lab found this spyware...

TOTEGHOSTLY 2.0: NSA Exploit of the Day
From Schneier on Security

TOTEGHOSTLY 2.0: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTEGHOSTLY 2.0 (TS//SI//REL) TOTEGHOSTLY 2.0 is STRAITBIZARRE based implant...

Debating Snowden's Actions
From Schneier on Security

Debating Snowden's Actions

It's the season. Here are two.

TOTECHASER: NSA Exploit of the Day
From Schneier on Security

TOTECHASER: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTECHASER (TS//SI//REL) TOTECHASER is a Windows CE implant targeting thehere...

What Information Are Stun Guns Recording?
From Schneier on Security

What Information Are Stun Guns Recording?

In a story about a stolen Stradivarius violin, there's this: Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for...

PICASSO: NSA Exploit of the Day
From Schneier on Security

PICASSO: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PICASSO (S//SI//REL) Modified GSM (target) handset that collects user data...

US Infosec Researchers Against NSA Surveillance
From Schneier on Security

US Infosec Researchers Against NSA Surveillance

I signed an open letter from US researchers in cryptography and information security on NSA surveillance. It has received a lot of media coverage.

Who Should Store NSA Surveillance Data
From Schneier on Security

Who Should Store NSA Surveillance Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...

Friday Squid Blogging: Giant Squid TED Talk
From Schneier on Security

Friday Squid Blogging: Giant Squid TED Talk

Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

MONKEYCALENDAR: NSA Exploit of the Day
From Schneier on Security

MONKEYCALENDAR: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MONKEYCALENDAR (TS//SI//REL) MONKEYCALENDAR is a software implant for GSMhere...

My Talk on the NSA
From Schneier on Security

My Talk on the NSA

Earlier this month, I gave a talk about the NSA at MIT. The video is available. ETA: The video doesn't display on some Firefox browsers. If you have trouble,...

The Insecurity of Secret IT Systems
From Schneier on Security

The Insecurity of Secret IT Systems

We now know a lot about the security of the Rapiscan 522 B x-ray system used to scan carry-on baggage in airports worldwide. Billy Rios, director of threat intelligence...

GOPHERSET: NSA Exploit of the Day
From Schneier on Security

GOPHERSET: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: GOPHERSET (TS//SI//REL) GOPHERSET is a software implant for GSM (Global System...

DROPOUTJEEP: NSA Exploit of the Day
From Schneier on Security

DROPOUTJEEP: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: DROPOUTJEEP (TS//SI//REL) DROPOUTJEEP is a STRAITBIZARRE based software implant...

SURLYSPAWN: NSA Exploit of the Day
From Schneier on Security

SURLYSPAWN: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: SURLYSPAWN (TS//SI//REL TO USA,FVEY) Data RF retro-reflector. Provides return...

DRM and the Law
From Schneier on Security

DRM and the Law

Cory Doctorow gives a good history of the intersection of Digital Rights Management (DRM) software and the law, describes how DRM software is antithetical to end...

"The Mask" Espionage Malware
From Schneier on Security

"The Mask" Espionage Malware

We’ve got a new nation-state espionage malware. "The Mask" was discovered by Kaspersky Labs: The primary targets are government institutions, diplomatic offices...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account