From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The police are increasingly getting search warrants for information about all cellphones in a certain location at a certain time: Police departments across the...Bruce Schneier From Schneier on Security | February 21, 2019 at 07:33 AM
At the end of January the US Department of Homeland Security issued a warning regarding serious DNS hijacking attempts against US government domains. Brian Krebs...Bruce Schneier From Schneier on Security | February 20, 2019 at 09:02 AM
Interesting -- although short and not very detailed -- article about Estonia's volunteer cyber-defense militia. Padar's militia of amateur IT workers, economists...Bruce Schneier From Schneier on Security | February 19, 2019 at 07:36 AM
It seems that someone from a company called Swift Recovery Ltd. is impersonating me -- at least on Telegram. The person is using a photo of me, and is using details...Bruce Schneier From Schneier on Security | February 18, 2019 at 03:42 PM
Recent articles about IoT vulnerabilities describe hacking of construction cranes, supermarket freezers, and electric scooters....Bruce Schneier From Schneier on Security | February 18, 2019 at 08:45 AM
Beautiful photo of a three-inch-long squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...Bruce Schneier From Schneier on Security | February 15, 2019 at 05:24 PM
Lessons learned in reconstructing the World War II-era SIGSALY voice encryption system....Bruce Schneier From Schneier on Security | February 15, 2019 at 07:33 AM
It's only a prototype, but this USB cable has an embedded Wi-Fi controller. Whoever controls that Wi-Fi connection can remotely execute commands on the attached...Bruce Schneier From Schneier on Security | February 14, 2019 at 07:53 AM
I had not heard about this case before. Zurich Insurance has refused to pay Mondelez International's claim of $100 million in damages from NotPetya. It claims it...Bruce Schneier From Schneier on Security | February 13, 2019 at 07:32 AM
In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: "We have proposed a system for electronic transactions without...Bruce Schneier From Schneier on Security | February 12, 2019 at 07:25 AM
The Hawaiian Bobtail Squid's genome is half again the size of a human's. Other facts: The Hawaiian bobtail squid has two different symbiotic organs, and researchers...Bruce Schneier From Schneier on Security | February 8, 2019 at 05:37 PM
Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government...Bruce Schneier From Schneier on Security | February 7, 2019 at 09:15 AM
In Gmail addresses, the dots don't matter. The account "[email protected]" maps to the exact same address as "[email protected]" and "b.r.u.c.e.schneier...Bruce Schneier From Schneier on Security | February 6, 2019 at 11:24 AM
Zcash just fixed a vulnerability that would have allowed "infinite counterfeit" Zcash. Like all the other blockchain vulnerabilities and updates, this demonstrates...Bruce Schneier From Schneier on Security | February 5, 2019 at 03:59 PM
The Wired headline sums it up nicely -- "Facebook Hires Up Three of Its Biggest Privacy Critics": In December, Facebook hired Nathan White away from the digital...Bruce Schneier From Schneier on Security | February 4, 2019 at 12:07 PM
Nice recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | February 1, 2019 at 05:38 PM
Our work in cybersecurity is inexorably intertwined with public policy and -- more generally -- the public interest. It's obvious in the debates on encryption...Bruce Schneier From Schneier on Security | February 1, 2019 at 10:48 AM
A year ago, the Norwegian Consumer Council published an excellent security analysis of children's GPS-connected smart watches. The security was terrible. Not only...Bruce Schneier From Schneier on Security | January 31, 2019 at 11:30 AM
The security is terrible: In a very short limited amount of time, three vulnerabilities have been discovered: Wifi credentials of the user have been recovered (stored...Bruce Schneier From Schneier on Security | January 30, 2019 at 11:00 AM
This is kind of a crazy iPhone vulnerability: it's possible to call someone on FaceTime and listen on their microphone -- and see from their camera -- before they...Bruce Schneier From Schneier on Security | January 29, 2019 at 02:12 PM