From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Story of Julie Miller, who cheated in multiple triathlon races: The difference between cheating in 1980 and cheating today is that it's much harder to get away...Bruce Schneier From Schneier on Security | April 14, 2016 at 07:44 AM
The company Cellebrite is developing a portable forensics device that would determine if a smartphone user was using the phone at a particular time. The idea is...Bruce Schneier From Schneier on Security | April 13, 2016 at 07:51 AM
Interesting article about how a former security director of the US Multi-State Lottery Association hacked the random-number generator in lottery software so he...Bruce Schneier From Schneier on Security | April 12, 2016 at 07:39 AM
Ross Anderson has liveblogged the 24th International Workshop on Security Protocols in Brno, Czech Republic....Bruce Schneier From Schneier on Security | April 11, 2016 at 03:06 PM
They feel quaint today: But in the spring of 1859, folks were concerned about another kind of hustle: A man who went by the name of A.V. Lamartine drifted from...Bruce Schneier From Schneier on Security | April 11, 2016 at 07:49 AM
Risotto nero and more. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 8, 2016 at 05:30 PM
Interesting research: Suphannee Sivakorn, Iasonas Polakis and Angelos D. Keromytis, "I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs": Abstract: Since...Bruce Schneier From Schneier on Security | April 8, 2016 at 07:39 AM
This works: Khan was arrested in mid-July 2015. Undercover police officers posing as company managers arrived at his workplace and asked to check his driver and...Bruce Schneier From Schneier on Security | April 7, 2016 at 07:39 AM
It's officially final; IBM has "completed the acquisition" of Resilient Systems, Inc. We are now "Resilient: an IBM Company." As I expected when I announced this...Bruce Schneier From Schneier on Security | April 6, 2016 at 01:47 PM
CONIKS is an new easy-to-use transparent key-management system: CONIKS is a key management system for end users capable of integration in end-to-end secure communication...Bruce Schneier From Schneier on Security | April 6, 2016 at 11:27 AM
I have a bunch of extra copies of my book Data and Goliath, and I am selling them at a discount. Details here....Bruce Schneier From Schneier on Security | April 4, 2016 at 03:41 PM
This is good: Threats constantly change, yet our political discourse suggests that our vulnerabilities are simply for lack of resources, commitment or competence...Bruce Schneier From Schneier on Security | April 3, 2016 at 04:50 PM
Squid-based research is yielding composites that are both strong and flexible. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | April 1, 2016 at 05:26 PM
Reddit has received a National Security Letter. I have long discounted warrant canaries. A gag order is serious, and this sort of high-school trick won't fool judges...Bruce Schneier From Schneier on Security | April 1, 2016 at 04:16 PM
Long and interesting article about a fixer who hacked multiple elections in Latin America. This isn't election hacking as in manipulate the voting machines or the...Bruce Schneier From Schneier on Security | April 1, 2016 at 10:50 AM
Tidbits from the New York Times: The final phase of Mr. Hame's training took place at an Internet cafe in Raqqa, where an Islamic State computer specialist handed...Bruce Schneier From Schneier on Security | March 31, 2016 at 07:10 AM
The FBI's legal battle with Apple is over, but the way it ended may not be good news for anyone. Federal agents had been seeking to compel Apple to break the security...Bruce Schneier From Schneier on Security | March 30, 2016 at 05:54 PM
Research paper: Elizabeth Stoycheff, "Under Surveillance: Examining Facebook's Spiral of Silence Effects in the Wake of NSA Internet Monitoring": Abstract: Since...Bruce Schneier From Schneier on Security | March 29, 2016 at 01:58 PM