From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Radio noise from a nearby neon-sign transformer made it impossible for people to unlock their cars remotely....Bruce Schneier From Schneier on Security | August 19, 2016 at 02:32 PM
Andrew Appel has a good two-part essay on securing elections. And three organizations -- Verified Voting, EPIC, and Common Cause -- have published a report on the...Bruce Schneier From Schneier on Security | August 19, 2016 at 06:15 AM
If you've read my book Liars and Outliers, you know I like the prisoner's dilemma as a way to think about trust and security. There is an enormous amount of research...Bruce Schneier From Schneier on Security | August 18, 2016 at 06:36 AM
The NSA was badly hacked in 2013, and we're just now learning about it. A group of hackers called "The Shadow Brokers" claim to have hacked the NSA, and are posting...Bruce Schneier From Schneier on Security | August 16, 2016 at 11:43 AM
New research: "Flip Feng Shui: Hammering a Needle in the Software Stack," by Kaveh Razavi, Ben Gras, Erik Bosman Bart Preneel, Cristiano Giuffrida, and Herbert...Bruce Schneier From Schneier on Security | August 16, 2016 at 08:09 AM
Both Kaspersky and Symantec have uncovered another piece of malware that seems to be a government design: The malware -- known alternatively as "ProjectSauron"...Bruce Schneier From Schneier on Security | August 15, 2016 at 02:43 PM
In a cautionary tale to those who favor government-mandated backdoors to security systems, Microsoft accidentally leaked the key protecting its UEFI Secure boot...Bruce Schneier From Schneier on Security | August 15, 2016 at 07:27 AM
Some minimal information about the NSA's abilities to hack networks via submarine....Bruce Schneier From Schneier on Security | August 12, 2016 at 01:48 PM
Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system...Bruce Schneier From Schneier on Security | August 12, 2016 at 07:52 AM
Here's an interesting hack against a computer's monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor...Bruce Schneier From Schneier on Security | August 11, 2016 at 02:09 PM
We're seeing car thefts in the wild accomplished through hacking: Houston police have arrested two men for a string of high-tech thefts of trucks and SUVs in the...Bruce Schneier From Schneier on Security | August 11, 2016 at 07:32 AM
Scott Atran has done some really interesting research on why ordinary people become terrorists. Academics who study warfare and terrorism typically don't conduct...Bruce Schneier From Schneier on Security | August 10, 2016 at 01:20 PM
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats....Bruce Schneier From Schneier on Security | August 10, 2016 at 07:06 AM
EFF has the story of malware from the Kazakhstan government against "journalists and political activists critical of Kazakhstan's authoritarian government, along...Bruce Schneier From Schneier on Security | August 9, 2016 at 03:14 PM
Citizen Lab has a new report on an Iranian government hacking program that targets dissidents. From a Washington Post op-ed by Ron Deibert: Al-Ameer is a net savvy...Bruce Schneier From Schneier on Security | August 9, 2016 at 06:26 AM
You can order a cocktail made with squid ink soda at Hank's Oyster Bar in Washington, DC....Bruce Schneier From Schneier on Security | August 5, 2016 at 05:22 PM