From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A Lego model of a giant space kraken destroying a Destroyer from Star Wars. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | September 23, 2016 at 05:14 PM
I like this Amtrak security awareness campaign. Especially the use of my term "security theater."...Bruce Schneier From Schneier on Security | September 22, 2016 at 02:03 PM
Impressive remote ,a href="http://www.pcworld.com/article/3121999/security/researchers-demonstrate-remote-attack-against-tesla-model-s.html">hack of the Tesla Model...Bruce Schneier From Schneier on Security | September 21, 2016 at 08:33 AM
This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder...Bruce Schneier From Schneier on Security | September 20, 2016 at 08:34 AM
"Periscope skimmers" are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they're impossible to notice. They're been found...Bruce Schneier From Schneier on Security | September 19, 2016 at 07:16 AM
I got this video from PZ Myers's blog. I know absolutely nothing about it. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | September 16, 2016 at 05:11 PM
Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards...Bruce Schneier From Schneier on Security | September 16, 2016 at 01:12 PM
Research paper: "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," by Ishtiaq Rouf, Rob Miller, Hossen...Bruce Schneier From Schneier on Security | September 16, 2016 at 09:59 AM
Remember the San Bernadino killer's iPhone, and how the FBI maintained that they couldn't get the encryption key without Apple providing them with a universal back...Bruce Schneier From Schneier on Security | September 15, 2016 at 09:54 AM
In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...Bruce Schneier From Schneier on Security | September 14, 2016 at 07:21 AM
Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely...Bruce Schneier From Schneier on Security | September 13, 2016 at 03:09 PM
The Intercept has published the manuals for Harris Corporation's IMSI catcher: Stingray. It's an impressive surveillance device....Bruce Schneier From Schneier on Security | September 13, 2016 at 08:51 AM
It costs less than $60. For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo...Bruce Schneier From Schneier on Security | September 12, 2016 at 03:07 PM
The malware "Mal/Miner-C" infects Internet-exposed Seagate Central Network Attached Storage (NAS) devices, and from there takes over connected computers to mine...Bruce Schneier From Schneier on Security | September 12, 2016 at 08:01 AM
Research on color-changing materials: What do squid and jellyfish skin have in common with human skin? All three have inspired a team of chemists to create materials...Bruce Schneier From Schneier on Security | September 9, 2016 at 05:31 PM
We have leak from yet another cyberweapons arms manufacturer: the Italian company RCS Labs. Vice Motherboard reports on a surveillance video demo: The video shows...Bruce Schneier From Schneier on Security | September 9, 2016 at 03:18 PM
Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company's...Bruce Schneier From Schneier on Security | September 9, 2016 at 10:12 AM
Ever since Ian Kristi, Apple's Head of Security Engineering and Architecture, presented the company's key backup technology at Black Hat 2016, people have been...Bruce Schneier From Schneier on Security | September 8, 2016 at 09:00 AM