From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Ad blockers represent the largest consumer boycott in human history. They're also an arms race between the blockers and the blocker blockers. This article discusses...Bruce Schneier From Schneier on Security | April 25, 2017 at 01:07 PM
Wow, is this cool. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | April 21, 2017 at 06:04 PM
The US Drug Enforcement Agency has purchased zero-day exploits from the cyberweapons arms manufacturer Hacking Team. BoingBoing post....Bruce Schneier From Schneier on Security | April 20, 2017 at 03:21 PM
This is impressive: The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to...Bruce Schneier From Schneier on Security | April 20, 2017 at 08:41 AM
Researchers build a covert channel between two virtual machines using a shared cache....Bruce Schneier From Schneier on Security | April 18, 2017 at 06:58 AM
Since Edward Snowden revealed to the world the extent of the NSA's global surveillance network, there has been a vigorous debate in the technological community...Bruce Schneier From Schneier on Security | April 17, 2017 at 07:21 AM
In another symptom of climate change, Chile's largest squid producer "plans to diversify its offering in the future, selling sea urchin, cod and octopus, to compensate...Bruce Schneier From Schneier on Security | April 14, 2017 at 05:25 PM
Carnegie Mellon University has released a comprehensive list of C++ secure-coding best practices....Bruce Schneier From Schneier on Security | April 14, 2017 at 08:20 AM
I regularly say that, on the Internet, attack is easier than defense. There are a bunch of reasons for this, but primarily it's 1) the complexity of modern networked...Bruce Schneier From Schneier on Security | April 13, 2017 at 06:45 AM
Interesting paper: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams": Abstract: In technical support scams, cybercriminals attempt to convince...Bruce Schneier From Schneier on Security | April 12, 2017 at 07:34 AM
There's a new malware called BrickerBot that permanently disables vulnerable IoT devices by corrupting their storage capability and reconfiguring kernel parameters...Bruce Schneier From Schneier on Security | April 11, 2017 at 09:22 AM
WikiLeaks is obviously playing their Top Secret CIA data cache for as much press as they can, leaking the documents a little at a time. On Friday they published...Bruce Schneier From Schneier on Security | April 10, 2017 at 03:16 PM
Last August, an unknown group called the Shadow Brokers released a bunch of NSA tools to the public. The common guesses were that the tools were discovered on an...Bruce Schneier From Schneier on Security | April 10, 2017 at 06:51 AM
This is just plain weird: Rosenthal, a neurobiologist at the Marine Biological Laboratory, was a grad student studying a specific protein in squid when he got an...Bruce Schneier From Schneier on Security | April 7, 2017 at 05:16 PM
NSA Deputy Director Richard Ledgett described a 2014 Russian cyber attack against the U.S. State Department as "hand-to-hand" combat: "It was hand-to-hand combat...Bruce Schneier From Schneier on Security | April 7, 2017 at 09:06 AM
There's ablog post from Google's Project Zero detailing an attack against Android phones over Wi-Fi. From Ars Technica: The vulnerability resides in a widely used...Bruce Schneier From Schneier on Security | April 6, 2017 at 08:52 AM