From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This should come as no surprise: users often compromise their own security by making mistakes setting up and using their encryption apps. Paper: "On the Security...Bruce Schneier From Schneier on Security | December 17, 2015 at 07:46 AM
Yesterday, the city of Los Angeles closed all of its schools -- over 1,000 schools -- because of a bomb threat. It was a hoax. LA officials defended the move, with...Bruce Schneier From Schneier on Security | December 16, 2015 at 07:28 AM
Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...Bruce Schneier From Schneier on Security | December 15, 2015 at 01:19 AM
The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....Bruce Schneier From Schneier on Security | December 14, 2015 at 06:46 AM
Neat: While the Dana octopus squid may lack a squid's trademark trailing tentacles, it makes up for them in spectacular lighting equipment, with two of its muscular...Bruce Schneier From Schneier on Security | December 11, 2015 at 05:02 PM
I'll be participating in an end-of-year trends and predictions webinar on Thursday, December 17, at 1:00 PM EST. Join me here. In other news, Resilient has joined...Bruce Schneier From Schneier on Security | December 11, 2015 at 03:56 PM
A Florida woman drove away after an accident, but her car automatically reported it anyway. She was arrested....Bruce Schneier From Schneier on Security | December 11, 2015 at 07:48 AM
Interesting research: "Identifying patterns in informal sources of security information," by Emilee Rader and Rick Wash, Journal of Cybersecurity, 1 Dec 2015. Abstract...Bruce Schneier From Schneier on Security | December 10, 2015 at 07:54 AM
I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...Bruce Schneier From Schneier on Security | December 9, 2015 at 02:48 PM
Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...Bruce Schneier From Schneier on Security | December 8, 2015 at 08:25 AM
Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...Bruce Schneier From Schneier on Security | December 7, 2015 at 06:35 AM
I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...Bruce Schneier From Schneier on Security | December 4, 2015 at 05:22 PM
BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...Bruce Schneier From Schneier on Security | December 4, 2015 at 07:40 AM
Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...Bruce Schneier From Schneier on Security | December 3, 2015 at 03:49 PM
Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...Bruce Schneier From Schneier on Security | December 3, 2015 at 08:55 AM
This article demonstrates that security is less important than functionality. When asked about their preference if they needed to choose between IT security and...Bruce Schneier From Schneier on Security | December 2, 2015 at 07:14 AM
Someone opened a LifeLock account in his ex-wife's name, and used the service to track her bank accounts, credit cards, and other financial activities. The article...Bruce Schneier From Schneier on Security | December 1, 2015 at 06:41 AM
This New Yorker article traces the history of privacy from the mid 1800s to today: As a matter of historical analysis, the relationship between secrecy and privacy...Bruce Schneier From Schneier on Security | November 30, 2015 at 01:47 PM
Algebraic Eraser is a public-key key-agreement protocol that's patented and being pushed by a company for the Internet of Things, primarily because it is efficient...Bruce Schneier From Schneier on Security | November 30, 2015 at 07:05 AM