From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research: "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," by Mathy Vanhoef and Frank Piessens: Abstract: We present new biases in RC4, break...Bruce Schneier From Schneier on Security | July 28, 2015 at 01:09 PM
The Stagefright vulnerability for Android phones is a bad one. It's exploitable via a text message (details depend on auto downloading of the particular phone),...Bruce Schneier From Schneier on Security | July 28, 2015 at 07:37 AM
This is an interesting article that looks at Hacking Team's purchasing of zero-day (0day) vulnerabilities from a variety of sources: Hacking Team's relationships...Bruce Schneier From Schneier on Security | July 27, 2015 at 07:17 AM
The California market squid, Doryteuthis opalescens, can manipulate its color in a variety of ways: Reflectins are aptly-named proteins unique to the light-sensing...Bruce Schneier From Schneier on Security | July 24, 2015 at 05:18 PM
A worker in Amazon's packaging department figured out how to deliver electronics to himself: Since he was employed with the packaging department, he had easy access...Bruce Schneier From Schneier on Security | July 24, 2015 at 01:49 PM
This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast...Bruce Schneier From Schneier on Security | July 23, 2015 at 07:17 AM
The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to...Bruce Schneier From Schneier on Security | July 23, 2015 at 02:33 AM
In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very...Bruce Schneier From Schneier on Security | July 22, 2015 at 08:26 PM
Google secures photos using public but unguessable URLs: So why is that public URL more secure than it looks? The short answer is that the URL is working as a password...Bruce Schneier From Schneier on Security | July 20, 2015 at 06:25 AM
I may have posted this short video before, but if I did, I can't find it. It's four years old, but still pretty to watch. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | July 17, 2015 at 05:09 PM
Micah Lee has a good tutorial on installing and using secure chat. To recap: We have installed Orbot and connected to the Tor network on Android, and we have installed...Bruce Schneier From Schneier on Security | July 17, 2015 at 07:35 AM
The ProxyHam project (and associated Def Con talk) has been canceled under mysterious circumstances. No one seems to know anything, and conspiracy theories abound...Bruce Schneier From Schneier on Security | July 16, 2015 at 12:00 PM
If you subscribe to my monthly e-mail newsletter, Crypto-Gram, you need to read this. Sometime between now and the August issue, the Crypto-Gram mailing list will...Bruce Schneier From Schneier on Security | July 15, 2015 at 03:15 AM
This is interesting: We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious activists...Bruce Schneier From Schneier on Security | July 14, 2015 at 06:53 AM
Interesting article on the NSA's use of multi-beam antennas for surveillance. Certainly smart technology; it can eavesdrop on multiple targets per antenna. I'm...Bruce Schneier From Schneier on Security | July 13, 2015 at 04:01 PM
A cute series of knitted plushies. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 10, 2015 at 05:29 PM
India is cracking down on people who use technology to cheat on exams: Candidates have been told to wear light clothes with half-sleeves, and shirts that do not...Bruce Schneier From Schneier on Security | July 10, 2015 at 01:44 PM
Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It's a huge trove...Bruce Schneier From Schneier on Security | July 10, 2015 at 05:35 AM