From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....Bruce Schneier From Schneier on Security | July 14, 2017 at 07:51 AM
I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...Bruce Schneier From Schneier on Security | July 13, 2017 at 07:06 AM
"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...Bruce Schneier From Schneier on Security | July 12, 2017 at 07:32 AM
This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...Bruce Schneier From Schneier on Security | July 10, 2017 at 07:04 AM
Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | July 7, 2017 at 03:08 PM
This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one....Bruce Schneier From Schneier on Security | July 7, 2017 at 02:01 PM
The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest...Bruce Schneier From Schneier on Security | July 7, 2017 at 07:20 AM
The website key.me will make a duplicate key from a digital photo. If a friend or coworker leaves their keys unattended for a few seconds, you know what to do.....Bruce Schneier From Schneier on Security | July 6, 2017 at 07:27 AM
It's hard to tell how much of this story is real and how much is aspirational, but it really is only a matter of time: About the size of a child's electric toy...Bruce Schneier From Schneier on Security | July 5, 2017 at 01:48 PM
Good commentaries from Ed Felten and Matt Blaze. Both make a point that I have also been saying: hacks can undermine the legitimacy of an election, even if there...Bruce Schneier From Schneier on Security | July 5, 2017 at 07:58 AM
I don't have anything to say -- mostly because I'm otherwise busy -- about the malware known as GoldenEye, NotPetya, or ExPetr. But I wanted a post to park links...Bruce Schneier From Schneier on Security | July 4, 2017 at 04:40 PM
This is nice work: "The Password Reset MitM Attack," by Nethanel Gelerntor, Senia Kalma, Bar Magnezi, and Hen Porcilan: Abstract: We present the password reset...Bruce Schneier From Schneier on Security | July 3, 2017 at 07:01 AM
According to a lawsuit (main article behind paywall), "a Miami-based food vendor and its supplier have been misrepresenting their squid as octopus in an effort...Bruce Schneier From Schneier on Security | June 30, 2017 at 05:22 PM
The 16th Workshop on Economics and Information Security was this week. Ross Anderson liveblogged the talks....Bruce Schneier From Schneier on Security | June 30, 2017 at 03:13 PM
Fortune magazine just published a good article about Google's Project Zero, which finds and publishes exploits in other companies' software products. I have mixed...Bruce Schneier From Schneier on Security | June 30, 2017 at 07:05 AM
Really good article about the women who worked at Bletchley Park during World War II, breaking German Enigma-encrypted messages....Bruce Schneier From Schneier on Security | June 29, 2017 at 01:40 PM
Websites are sending information prematurely: ...we discovered NaviStone's code on sites run by Acurian, Quicken Loans, a continuing education center, a clothing...Bruce Schneier From Schneier on Security | June 29, 2017 at 07:51 AM
The Girl Scouts are going to be offering 18 merit badges in cybersecurity, to scouts as young as five years old....Bruce Schneier From Schneier on Security | June 28, 2017 at 01:56 PM
WikiLeaks has published CherryBlossom, the CIA's program to hack into wireless routers. The program is about a decade old. Four good news articles. Five. And a...Bruce Schneier From Schneier on Security | June 28, 2017 at 06:35 AM