From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The New York Times has a long article on fraudulent locksmiths. The scam is a basic one: quote a low price on the phone, but charge much more once you show up and...Bruce Schneier From Schneier on Security | February 8, 2016 at 07:52 AM
The NSA is undergoing a major reorganization, combining its attack and defense sides into a single organization: In place of the Signals Intelligence and Information...Bruce Schneier From Schneier on Security | February 5, 2016 at 04:15 PM
This research shows how to track e-commerce users better across multiple sessions, even when they do not provide unique identifiers such as user IDs or cookies....Bruce Schneier From Schneier on Security | February 5, 2016 at 07:56 AM
The Internet of Things is the name given to the computerization of everything in our lives. Already you can buy Internet-enabled thermostats, light bulbs, refrigerators...Bruce Schneier From Schneier on Security | February 4, 2016 at 07:18 AM
Both the "going dark" metaphor of FBI Director James Comey and the contrasting "golden age of surveillance" metaphor of privacy law professor Peter Swire focus...Bruce Schneier From Schneier on Security | February 3, 2016 at 07:09 AM
I am pleased to have been a part of this report, part of the Berkman Center's Berklett Cybersecurity project: Don't Panic: Making Progress on the "Going Dark" Debate...Bruce Schneier From Schneier on Security | February 2, 2016 at 03:20 PM
The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q...Bruce Schneier From Schneier on Security | February 2, 2016 at 08:11 AM
The NSA and GCHQ have successfully hacked Israel's drones, according to the Snowden documents. The story is being reported by the Intercept and Der Spiegel. The...Bruce Schneier From Schneier on Security | February 1, 2016 at 03:27 PM
Rob Joyce, the head of the NSA's Tailored Access Operations (TAO) group -- basically the country's chief hacker -- spoke in public earlier this week. He talked...Bruce Schneier From Schneier on Security | February 1, 2016 at 07:42 AM
From 1909, for squid fishing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | January 29, 2016 at 05:23 PM
Cyberthreats are changing. We're worried about hackers crashing airplanes by hacking into computer networks. We're worried about hackers remotely disabling cars...Bruce Schneier From Schneier on Security | January 29, 2016 at 08:29 AM
This is interesting: Game theory decision-making is based entirely on reason, but humans don't always behave rationally. David Rand, assistant professor of psychology...Bruce Schneier From Schneier on Security | January 28, 2016 at 07:18 AM
This is just awful. Their troll -- or trolls, as the case may be -- have harassed Paul and Amy in nearly every way imaginable. Bomb threats have been made under...Bruce Schneier From Schneier on Security | January 27, 2016 at 07:20 AM
There's a lot out there: The feed includes images of marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back...Bruce Schneier From Schneier on Security | January 25, 2016 at 07:25 AM
North Coast Squid is a local writing journal from Manzanita, Oregon. It's going to publish its fifth edition this year. As usual, you can also use this squid post...Bruce Schneier From Schneier on Security | January 22, 2016 at 05:19 PM
The UK government is pushing something called the MIKEY-SAKKE protocol to secure voice. Basically, it's an identity-based system that necessarily requires a trusted...Bruce Schneier From Schneier on Security | January 22, 2016 at 03:23 PM
Interesting research: Douglas W. Allen and Peter T. Leeson, "Institutionally Constrained Technology Adoption: Resolving the Longbow Puzzle," Journal of Law and...Bruce Schneier From Schneier on Security | January 22, 2016 at 07:44 AM