From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
An interactive animation from the Museum of New Zealand Te Papa Tongarewa. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | July 25, 2014 at 05:46 PM
Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there's no reason this can't scale to much larger numbers...Bruce Schneier From Schneier on Security | July 25, 2014 at 11:35 AM
A group of hackers are using a vulnerability in the Next thermostat to secure it against Nest's remote data collection....Bruce Schneier From Schneier on Security | July 22, 2014 at 11:46 AM
Here's a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly...Bruce Schneier From Schneier on Security | July 21, 2014 at 04:38 PM
A six-hour video of a giant squid dissection from Auckland University of Technology. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | July 18, 2014 at 05:35 PM
The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...Bruce Schneier From Schneier on Security | July 17, 2014 at 04:54 PM
The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...Bruce Schneier From Schneier on Security | July 17, 2014 at 07:17 AM
Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....Bruce Schneier From Schneier on Security | July 16, 2014 at 07:02 AM
Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...Bruce Schneier From Schneier on Security | July 15, 2014 at 03:30 PM
Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...Bruce Schneier From Schneier on Security | July 15, 2014 at 07:49 AM
The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...Bruce Schneier From Schneier on Security | July 14, 2014 at 03:01 PM
This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...Bruce Schneier From Schneier on Security | July 14, 2014 at 07:16 AM
Neat video shot from a remote-operated vehicle. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | July 11, 2014 at 05:58 PM
Funny, and the inspiration for this week's headlines. (Note that the image shows Password Safe on the screen.) And marginally related, here's an odd essay about...Bruce Schneier From Schneier on Security | July 11, 2014 at 04:53 PM
Okay, it's a parody: The Russian Federation is more complex. At a political level there's a lot of grandstanding. Operationally though, we share intelligence with...Bruce Schneier From Schneier on Security | July 11, 2014 at 07:53 AM
Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated...Bruce Schneier From Schneier on Security | July 10, 2014 at 03:56 PM
LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...Bruce Schneier From Schneier on Security | July 10, 2014 at 07:36 AM
The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...Bruce Schneier From Schneier on Security | July 9, 2014 at 01:55 PM