From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I've been saying for years that it's bad security advice, that it encourages poor passwords. Lorrie Cranor, now the FTC's chief technologist, agrees: By studying...Bruce Schneier From Schneier on Security | August 5, 2016 at 08:53 AM
The Open Technology Institute of the New America Foundation has released a policy paper on the vulnerabilities equities process: "Bugs in the System: A Primer on...Bruce Schneier From Schneier on Security | August 4, 2016 at 08:25 AM
NIST is no longer recommending two-factor authentication systems that use SMS, because of their many insecurities. In the latest draft of its Digital Authentication...Bruce Schneier From Schneier on Security | August 3, 2016 at 08:11 AM
Last week, President Obama issued a policy directive (PPD-41) on cyber-incident response coordination. The FBI is in charge, which is no surprise. Actually, there's...Bruce Schneier From Schneier on Security | August 2, 2016 at 07:40 AM
Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille's research team revealed a new set of wireless keyboard attacks...Bruce Schneier From Schneier on Security | August 1, 2016 at 04:07 PM
Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security...Bruce Schneier From Schneier on Security | August 1, 2016 at 07:49 AM
Archie McPhee sells glow-in-the-dark finger tentacles. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | July 29, 2016 at 05:05 PM
I spend a lot of time in my book Liars and Outliers on cooperating versus defecting. Cooperating is good for the group at the expense of the individual. Defecting...Bruce Schneier From Schneier on Security | July 29, 2016 at 01:23 PM
Russia was behind the hacks into the Democratic National Committee's computer network that led to the release of thousands of internal emails just before the party's...Bruce Schneier From Schneier on Security | July 29, 2016 at 07:29 AM
Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation...Bruce Schneier From Schneier on Security | July 28, 2016 at 06:51 AM
Andrew "bunnie" Huang and Edward Snowden have designed a smartphone case that detects unauthorized transmissions by the phone. Paper. Three news articles. Looks...Bruce Schneier From Schneier on Security | July 27, 2016 at 02:09 PM
Interesting law journal paper: "Intelligence Legalism and the National Security Agency's Civil Liberties Gap," by Margo Schlanger: Abstract: This paper examines...Bruce Schneier From Schneier on Security | July 27, 2016 at 07:47 AM
Amazingly enough, the preponderance of the evidence points to Russia as the source of the DNC leak. I was going to summarize the evidence, but Thomas Rid did a...Bruce Schneier From Schneier on Security | July 26, 2016 at 02:40 PM
Here's the story of how it was done. First, a fake ad on torrent listings linked the site to a Latvian bank account, an e-mail address, and a Facebook page. Using...Bruce Schneier From Schneier on Security | July 26, 2016 at 07:42 AM
The Economist has an article on the potential hacking of the global financial system, both for profit or to cause mayhem. It's reasonably balanced. So how might...Bruce Schneier From Schneier on Security | July 25, 2016 at 07:10 AM
A post-mortem of a stranded sperm whale shows that he had recently eaten squid. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | July 22, 2016 at 05:14 PM
Good essay pointing out the absurdity of comparing cyber weapons with nuclear weapons. On the surface, the analogy is compelling. Like nuclear weapons, the most...Bruce Schneier From Schneier on Security | July 22, 2016 at 12:08 PM
Old, but interesting. The document was published by DARPA in 1973, and approved for release in 2007. It examines the role of deception on strategic warning systems...Bruce Schneier From Schneier on Security | July 21, 2016 at 10:54 AM
Two researchers are working on a system to detect spoofed messages sent to automobiles by fingerprinting the clock skew of the various computer components within...Bruce Schneier From Schneier on Security | July 20, 2016 at 08:26 AM