From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients...Bruce Schneier From Schneier on Security | January 22, 2018 at 07:38 AM
The New Zealand home of the colossal squid exhibit is behind renovated. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | January 19, 2018 at 05:48 PM
Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. Abstract: This report assesses the impact disclosure...Bruce Schneier From Schneier on Security | January 19, 2018 at 07:06 AM
Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society...Bruce Schneier From Schneier on Security | January 17, 2018 at 07:23 AM
Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets....Bruce Schneier From Schneier on Security | January 16, 2018 at 07:58 AM
No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but...Bruce Schneier From Schneier on Security | January 15, 2018 at 07:43 AM
This seems to be a trend. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | January 12, 2018 at 05:12 PM
In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files....Bruce Schneier From Schneier on Security | January 11, 2018 at 01:50 PM
Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the...Bruce Schneier From Schneier on Security | January 11, 2018 at 08:05 AM
Susan Landau has written a terrific book on cybersecurity threats and why we need strong crypto. Listening In: Cybersecurity in an Insecure Age. It's based in part...Bruce Schneier From Schneier on Security | January 10, 2018 at 02:42 PM
Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan....Bruce Schneier From Schneier on Security | January 10, 2018 at 08:27 AM
Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects...Bruce Schneier From Schneier on Security | January 9, 2018 at 04:26 PM
The Washington Post is reporting that poor morale at the NSA is causing a significant talent shortage. A November New York Times article said much the same thing...Bruce Schneier From Schneier on Security | January 9, 2018 at 06:58 AM
A comprehensive list. Most are old and obvious, but there are some clever variants....Bruce Schneier From Schneier on Security | January 8, 2018 at 07:34 AM
Experiments on the oval squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | January 5, 2018 at 05:42 PM
The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw...Bruce Schneier From Schneier on Security | January 5, 2018 at 03:22 PM
My next book is still on track for a September 2018 publication. Norton is still the publisher. The title is now Click Here to Kill Everybody: Peril and Promise...Bruce Schneier From Schneier on Security | January 5, 2018 at 01:45 PM