From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
You can edit anyone's information you want: The question, boiled down, was haunting: Want to see how easy it would be to get into someone's voter registration and...Bruce Schneier From Schneier on Security | October 11, 2016 at 03:04 PM
Interesting research in Nature. The article is behind a paywall, but here are five summaries of the research....Bruce Schneier From Schneier on Security | October 11, 2016 at 06:51 AM
Brian Krebs is a popular reporter on the cybersecurity beat. He regularly exposes cybercriminals and their tactics, and consequently is regularly a target of their...Bruce Schneier From Schneier on Security | October 10, 2016 at 11:26 AM
All cephalopods are colorblind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 7, 2016 at 05:37 PM
The NSA has another contractor who stole classified documents. It's a weird story: "But more than a month later, the authorities cannot say with certainty whether...Bruce Schneier From Schneier on Security | October 7, 2016 at 07:07 AM
News here and here. Other companies have been quick to deny that they did the same thing, but I generally don't believe those carefully worded statements about...Bruce Schneier From Schneier on Security | October 6, 2016 at 02:58 PM
This paper wins "best abstract" award: "Quantum Tokens for Digital Signatures," by Shalev Ben David and Or Sattath: Abstract: The fisherman caught a quantum fish...Bruce Schneier From Schneier on Security | October 6, 2016 at 08:03 AM
Forbes is reporting that the Israeli cyberweapons arms manufacturer Wintego has a man-in-the-middle exploit against WhatsApp. It's a weird story. I'm not sure how...Bruce Schneier From Schneier on Security | October 4, 2016 at 02:47 PM
This article on US/China cooperation and competition in cyberspace is an interesting lens through which to examine security policy....Bruce Schneier From Schneier on Security | October 4, 2016 at 07:40 AM
Interesting survey of the cybersecurity culture in Norway. 96% of all Norwegian are online, more than 90% embrace new technology, and 6 of 10 feel capable of judging...Bruce Schneier From Schneier on Security | October 3, 2016 at 07:23 AM
Every few years, a researcher replicates a security study by littering USB sticks around an organization's grounds and waiting to see how many people pick them...Bruce Schneier From Schneier on Security | October 3, 2016 at 07:12 AM
The Gonatus squid eats its own kind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 30, 2016 at 05:14 PM
Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data...Bruce Schneier From Schneier on Security | September 30, 2016 at 07:16 AM
Interesting research from Sasha Romanosky at RAND: Abstract: In 2013, the US President signed an executive order designed to help secure the nation's critical infrastructure...Bruce Schneier From Schneier on Security | September 29, 2016 at 07:51 AM
A new malware tries to detect if it's running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they're...Bruce Schneier From Schneier on Security | September 28, 2016 at 07:34 AM
Neural networks are good at identifying faces, even if they're blurry: In a paper released earlier this month, researchers at UT Austin and Cornell University demonstrate...Bruce Schneier From Schneier on Security | September 27, 2016 at 10:39 AM
Brian Krebs writes about the massive DDoS attack against his site. In fact, the site is down as I post this....Bruce Schneier From Schneier on Security | September 26, 2016 at 04:59 PM
A Lego model of a giant space kraken destroying a Destroyer from Star Wars. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | September 23, 2016 at 05:14 PM