From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is some interesting research. You can fool facial recognition systems by wearing glasses printed with elements of other peoples' faces. Mahmood Sharif, Sruti...Bruce Schneier From Schneier on Security | November 11, 2016 at 08:31 AM
Ad networks are surreptitiously using ultrasonic communications to jump from device to device. It should come as no surprise that this communications channel can...Bruce Schneier From Schneier on Security | November 10, 2016 at 01:19 PM
Late last month, popular websites like Twitter, Pinterest, Reddit and PayPal went down for most of a day. The distributed denial-of-service attack that caused the...Bruce Schneier From Schneier on Security | November 10, 2016 at 07:06 AM
The NSA has been abandoning secret and proprietary cryptographic algorithms in favor of commercial public algorithms, generally known as "Suite B." In 2010, an...Bruce Schneier From Schneier on Security | November 9, 2016 at 01:00 PM
This is exactly the sort of Internet-of-Things attack that has me worried: "IoT Goes Nuclear: Creating a ZigBee Chain Reaction" by Eyal Ronen, Colin OFlynn, Adi...Bruce Schneier From Schneier on Security | November 9, 2016 at 07:54 AM
A week ago Friday, someone took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name provider Dyn. DDoS...Bruce Schneier From Schneier on Security | November 8, 2016 at 07:25 AM
Firefox is removing the battery status API, citing privacy concerns. Here's the paper that described those concerns: Abstract. We highlight privacy risks associated...Bruce Schneier From Schneier on Security | November 7, 2016 at 01:59 PM
For years, the DMCA has been used to stifle legitimate research into the security of embedded systems. Finally, the research exemption to the DMCA is in effect...Bruce Schneier From Schneier on Security | November 7, 2016 at 06:33 AM
A sperm whale has been sighted in Monterey Bay, hunting squid. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | November 4, 2016 at 05:41 PM
New Atlas has a great three-part feature on the history of hacking as portrayed in films, including video clips. The 1980s. The 1990s. The 2000s....Bruce Schneier From Schneier on Security | November 4, 2016 at 01:12 PM
Google's new ways to violate your privacy and -- more importantly -- how to opt out....Bruce Schneier From Schneier on Security | November 3, 2016 at 02:00 PM
Researchers have trained a neural network to encrypt its communications. In their experiment, computers were able to make their own form of encryption using machine...Bruce Schneier From Schneier on Security | November 3, 2016 at 07:05 AM
There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here...Bruce Schneier From Schneier on Security | November 1, 2016 at 03:10 PM
An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....Bruce Schneier From Schneier on Security | October 31, 2016 at 02:12 PM
Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 28, 2016 at 05:11 PM