From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The New York Times is reporting that a US citizen’s phone was hacked by the Predator spyware.
A U.S. and Greek national who worked on Meta’s security and trust...Bruce Schneier From Schneier on Security | March 21, 2023 at 08:34 AM
At least, it seems to be a new species.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my...Bruce Schneier From Schneier on Security | March 17, 2023 at 05:19 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking on “How to Reclaim Power in the Digital World” at EPFL in Lausanne, Switzerland,...Schneier.com Webmaster From Schneier on Security | March 14, 2023 at 03:08 PM
By Nathan E. Sanders & Bruce Schneier
Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests. In somepours...Schneier.com Webmaster From Schneier on Security | March 14, 2023 at 12:01 PM
From Brian Krebs:
A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as...Bruce Schneier From Schneier on Security | March 14, 2023 at 07:23 AM
Chinese squid fishing boats are overwhelming Ecuador and Peru.
As usual, you can also use this squid post to talk about the security stories in the news that Ihere...Bruce Schneier From Schneier on Security | March 10, 2023 at 05:05 PM
An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.Bruce Schneier From Schneier on Security | March 10, 2023 at 03:05 PM
Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates.
On Thursday, security firm Mandiant published a report...Bruce Schneier From Schneier on Security | March 9, 2023 at 08:33 PM
Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully...Bruce Schneier From Schneier on Security | March 8, 2023 at 06:11 AM
This is a good survey on prompt injection attacks on large language models (like ChatGPT).
Abstract: We are currently witnessing dramatic advances in the capabilities...Bruce Schneier From Schneier on Security | March 7, 2023 at 07:13 AM
Last week the Biden Administration released a new National Cybersecurity Strategy (summary >here. There is lots of good commentary out there. It’s basically a smart...Bruce Schneier From Schneier on Security | March 6, 2023 at 07:06 AM
Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion:
Regulators...Bruce Schneier From Schneier on Security | March 3, 2023 at 10:58 AM
Troy Hunt is collecting examples of dumb password rules.
There are some pretty bad disasters out there.
My worst experiences are with sites that have artificial...Bruce Schneier From Schneier on Security | March 2, 2023 at 07:05 AM
A reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.Bruce Schneier From Schneier on Security | March 1, 2023 at 07:06 AM
CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.
Researchers have...Bruce Schneier From Schneier on Security | February 28, 2023 at 07:19 AM
Congress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea and the side...Bruce Schneier From Schneier on Security | February 27, 2023 at 07:06 AM
This video of a modern large squid processing ship is a bit gory, but also interesting.
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | February 24, 2023 at 05:02 PM
This is really interesting research from a few months ago:
Abstract: Given the computational cost and technical expertise required to train machine learning models...Bruce Schneier From Schneier on Security | February 24, 2023 at 07:34 AM
The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense...Bruce Schneier From Schneier on Security | February 23, 2023 at 07:27 AM
Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green.
As mentioned...Bruce Schneier From Schneier on Security | February 22, 2023 at 07:30 AM