From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models....Bruce Schneier From Schneier on Security | March 21, 2025 at 02:26 PM
The UK’s National Computer Security Center (part of GCHQ) released a timeline—also see their blog post—for migration to quantum-computer-resistant cryptography....Bruce Schneier From Schneier on Security | March 21, 2025 at 07:47 AM
This is serious:
A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...Bruce Schneier From Schneier on Security | March 20, 2025 at 11:14 AM
Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama:
Abstract: In human...Bruce Schneier From Schneier on Security | March 18, 2025 at 07:10 AM
New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
Abstract: Key lengths...Bruce Schneier From Schneier on Security | March 17, 2025 at 11:09 AM
A bagpipe and drum band:
SQUID transforms traditional Bagpipe and Drum Band entertainment into a multi-sensory rush of excitement, featuring high energy bagpipes...Bruce Schneier From Schneier on Security | March 14, 2025 at 05:03 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the Rossfest Symposium in Cambridge, UK, on March 25, 2025.
I’m speaking at the...Bruce Schneier From Schneier on Security | March 14, 2025 at 12:03 PM
There is a new botnet that is infecting TP-Link routers:
The botnet can lead to command injection which then makes remote code execution (RCE) possible so that...Bruce Schneier From Schneier on Security | March 14, 2025 at 07:02 AM
Former CISA Director Jen Easterly writes about a new international intelligence sharing co-op:
Historically, China, Russia, Iran & North Korea have cooperated to...Bruce Schneier From Schneier on Security | March 12, 2025 at 07:09 AM
Lots of interesting details in the story:
The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade...Bruce Schneier From Schneier on Security | March 11, 2025 at 01:14 PM
The malware includes four separate backdoors:
Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed...Bruce Schneier From Schneier on Security | March 10, 2025 at 07:01 AM
The EFF has created an open-source hardware tool to detect IMSI catchers: fake cell phone towers that are used for mass surveillance of an area.
It runs on a $20...Bruce Schneier From Schneier on Security | March 7, 2025 at 12:03 PM
Of the five, one is a Windows vulnerability, another is a Cisco vulnerability. We don’t have any details about who is exploiting them, or how.
News article. Slashdot...Bruce Schneier From Schneier on Security | March 5, 2025 at 07:00 AM
This is a sad story of someone who downloaded a Trojaned AI tool that resulted in hackers taking over his computer and, ultimately, costing him his job.Bruce Schneier From Schneier on Security | March 4, 2025 at 07:08 AM
Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“:
Abstract: We present a surprising result regarding LLMs and...Bruce Schneier From Schneier on Security | February 27, 2025 at 01:05 PM
Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United...Bruce Schneier From Schneier on Security | February 26, 2025 at 07:07 AM