From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Here's an interesting research paper that tries to calculate the differential value of privacy-invasive advertising practices. The researchers used data from a...Bruce Schneier From Schneier on Security | August 24, 2015 at 06:50 AM
Nice and easy Calamari Ripieni recipe, along with general instructions on cooking squid: Tenderizing squid is as simple as pounding it flat -- if you're going to...Bruce Schneier From Schneier on Security | August 21, 2015 at 05:07 PM
Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different...Bruce Schneier From Schneier on Security | August 21, 2015 at 01:36 PM
Interesting: Remember that vulnerability in the SS7 inter-carrier network that lets hackers and spies track your cellphone virtually anywhere in the world? It's...Bruce Schneier From Schneier on Security | August 21, 2015 at 07:47 AM
The US government has admitted that it uses predictive assessments to put people on the no-fly list: In a little-noticed filing before an Oregon federal judge,...Bruce Schneier From Schneier on Security | August 20, 2015 at 07:19 AM
This is serious: Cisco Systems officials are warning customers of a series of attacks that completely hijack critical networking gear by swapping out the valid...Bruce Schneier From Schneier on Security | August 19, 2015 at 01:34 PM
This is interesting: First, it integrates with corporate directories such as Active Directory and social media sites like LinkedIn to map the connections between...Bruce Schneier From Schneier on Security | August 19, 2015 at 08:11 AM
Two former Kaspersky employees have accused the company of faking malware to harm rival antivirus products. They would falsely classify legitimate files as malicious...Bruce Schneier From Schneier on Security | August 18, 2015 at 03:35 PM
I've previously written about mail cover -- the practice of recording the data on mail envelopes. Sai has been covering the issue in more detail, and recently received...Bruce Schneier From Schneier on Security | August 18, 2015 at 07:48 AM
One of the books confiscated from Chelsea Manning was a copy of Data and Goliath....Bruce Schneier From Schneier on Security | August 17, 2015 at 05:24 PM
Oracle's CSO Mary Ann Davidson wrote a blog post ranting against security experts finding vulnerabilities in her company's products. The blog post has been taken...Bruce Schneier From Schneier on Security | August 17, 2015 at 07:45 AM
There's a new article, published jointly by The New York Times and ProPublica, aboutNSA's longstanding relationship with AT&T. It's based on the Snowden documents...Bruce Schneier From Schneier on Security | August 15, 2015 at 01:44 PM
I think it's a very pretty creature with some impressive adaptations. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | August 15, 2015 at 01:32 PM
Good operational security is hard, and often uses manual technologies: Investigators described how Messina Denaro, 53, disdains telecommunications and relies on...Bruce Schneier From Schneier on Security | August 13, 2015 at 07:33 AM
Prosecutors from New York, London, Paris, and Madrid wrote an op-ed in yesterday's New York Times in favor of backdoors in cell phone encryption. There are a number...Bruce Schneier From Schneier on Security | August 12, 2015 at 03:18 PM
This FBI alert is interesting: (U//FOUO) In May 2015, the wife of a US military member was approached in front of her home by two Middle-Eastern males. The men...Bruce Schneier From Schneier on Security | August 12, 2015 at 06:49 AM