From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research: "Flip Feng Shui: Hammering a Needle in the Software Stack," by Kaveh Razavi, Ben Gras, Erik Bosman Bart Preneel, Cristiano Giuffrida, and Herbert...Bruce Schneier From Schneier on Security | August 16, 2016 at 08:09 AM
Both Kaspersky and Symantec have uncovered another piece of malware that seems to be a government design: The malware -- known alternatively as "ProjectSauron"...Bruce Schneier From Schneier on Security | August 15, 2016 at 02:43 PM
In a cautionary tale to those who favor government-mandated backdoors to security systems, Microsoft accidentally leaked the key protecting its UEFI Secure boot...Bruce Schneier From Schneier on Security | August 15, 2016 at 07:27 AM
Some minimal information about the NSA's abilities to hack networks via submarine....Bruce Schneier From Schneier on Security | August 12, 2016 at 01:48 PM
Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system...Bruce Schneier From Schneier on Security | August 12, 2016 at 07:52 AM
Here's an interesting hack against a computer's monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor...Bruce Schneier From Schneier on Security | August 11, 2016 at 02:09 PM
We're seeing car thefts in the wild accomplished through hacking: Houston police have arrested two men for a string of high-tech thefts of trucks and SUVs in the...Bruce Schneier From Schneier on Security | August 11, 2016 at 07:32 AM
Scott Atran has done some really interesting research on why ordinary people become terrorists. Academics who study warfare and terrorism typically don't conduct...Bruce Schneier From Schneier on Security | August 10, 2016 at 01:20 PM
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats....Bruce Schneier From Schneier on Security | August 10, 2016 at 07:06 AM
EFF has the story of malware from the Kazakhstan government against "journalists and political activists critical of Kazakhstan's authoritarian government, along...Bruce Schneier From Schneier on Security | August 9, 2016 at 03:14 PM
Citizen Lab has a new report on an Iranian government hacking program that targets dissidents. From a Washington Post op-ed by Ron Deibert: Al-Ameer is a net savvy...Bruce Schneier From Schneier on Security | August 9, 2016 at 06:26 AM
You can order a cocktail made with squid ink soda at Hank's Oyster Bar in Washington, DC....Bruce Schneier From Schneier on Security | August 5, 2016 at 05:22 PM
I've been saying for years that it's bad security advice, that it encourages poor passwords. Lorrie Cranor, now the FTC's chief technologist, agrees: By studying...Bruce Schneier From Schneier on Security | August 5, 2016 at 08:53 AM
The Open Technology Institute of the New America Foundation has released a policy paper on the vulnerabilities equities process: "Bugs in the System: A Primer on...Bruce Schneier From Schneier on Security | August 4, 2016 at 08:25 AM
NIST is no longer recommending two-factor authentication systems that use SMS, because of their many insecurities. In the latest draft of its Digital Authentication...Bruce Schneier From Schneier on Security | August 3, 2016 at 08:11 AM