From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there's no reason this can't scale to much larger numbers...Bruce Schneier From Schneier on Security | July 25, 2014 at 11:35 AM
A group of hackers are using a vulnerability in the Next thermostat to secure it against Nest's remote data collection....Bruce Schneier From Schneier on Security | July 22, 2014 at 11:46 AM
Here's a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly...Bruce Schneier From Schneier on Security | July 21, 2014 at 04:38 PM
A six-hour video of a giant squid dissection from Auckland University of Technology. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | July 18, 2014 at 05:35 PM
The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...Bruce Schneier From Schneier on Security | July 17, 2014 at 04:54 PM
The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...Bruce Schneier From Schneier on Security | July 17, 2014 at 07:17 AM
Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....Bruce Schneier From Schneier on Security | July 16, 2014 at 07:02 AM
Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...Bruce Schneier From Schneier on Security | July 15, 2014 at 03:30 PM
Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...Bruce Schneier From Schneier on Security | July 15, 2014 at 07:49 AM
The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...Bruce Schneier From Schneier on Security | July 14, 2014 at 03:01 PM
This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...Bruce Schneier From Schneier on Security | July 14, 2014 at 07:16 AM
Neat video shot from a remote-operated vehicle. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | July 11, 2014 at 05:58 PM
Funny, and the inspiration for this week's headlines. (Note that the image shows Password Safe on the screen.) And marginally related, here's an odd essay about...Bruce Schneier From Schneier on Security | July 11, 2014 at 04:53 PM
Okay, it's a parody: The Russian Federation is more complex. At a political level there's a lot of grandstanding. Operationally though, we share intelligence with...Bruce Schneier From Schneier on Security | July 11, 2014 at 07:53 AM
Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated...Bruce Schneier From Schneier on Security | July 10, 2014 at 03:56 PM
LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...Bruce Schneier From Schneier on Security | July 10, 2014 at 07:36 AM
The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...Bruce Schneier From Schneier on Security | July 9, 2014 at 01:55 PM
Man-in-the-middle attack against a Brazilian payment system: Brazil has an extremely active and talented cybercrime underground, and increasingly Brazilian organized...Bruce Schneier From Schneier on Security | July 9, 2014 at 08:30 AM