From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Pew Research has a new survey on Americans' privacy habits in a post-Snowden world. The 87% of those who had heard at least something about the programs were asked...Bruce Schneier From Schneier on Security | March 31, 2015 at 03:54 PM
There's a Chinese CA that's issuing fraudulent Google certificates. Yet another example of why the CA model is so broken....Bruce Schneier From Schneier on Security | March 31, 2015 at 01:42 PM
In the US, certain types of warrants can come with gag orders preventing the recipient from disclosing the existence of warrant to anyone else. A warrant canary...Bruce Schneier From Schneier on Security | March 31, 2015 at 08:19 AM
This is a clever attack, using a black box that attaches to the iPhone via USB: As you know, an iPhone keeps a count of how many wrong PINs have been entered, in...Bruce Schneier From Schneier on Security | March 30, 2015 at 07:47 AM
More research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 27, 2015 at 05:03 PM
Researchers have managed to get two computers to communicate using heat and thermal sensors. It's not really viable communication -- the bit rate is eight per hour...Bruce Schneier From Schneier on Security | March 27, 2015 at 08:01 AM
The Intercept and the New Zealand Herald have reported that New Zealand spied on communications about the World Trade Organization director-general candidates....Bruce Schneier From Schneier on Security | March 26, 2015 at 10:59 AM
There's a new story about the hacking capabilities of Canada's Communications Security Establishment (CSE), based on the Snowden documents....Bruce Schneier From Schneier on Security | March 25, 2015 at 07:55 AM
The Brennan Center has a long report on what's wrong with the FISA Court and how to fix it. At the time of its creation, many lawmakers saw constitutional problems...Bruce Schneier From Schneier on Security | March 24, 2015 at 10:09 AM
We've learned a lot about the NSA's abilities to hack a computer's BIOS so that the hack survives reinstalling the OS. Now we have a research presentation about...Bruce Schneier From Schneier on Security | March 23, 2015 at 08:07 AM
Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 20, 2015 at 05:57 PM
David Omand -- GCHQ director from 1996-1997, and the UK's security and intelligence coordinator from 2000-2005 -- has just published a new paper: "Understanding...Bruce Schneier From Schneier on Security | March 20, 2015 at 02:51 PM
Last May, we learned that the NSA intercepts equipment being shipped around the world and installs eavesdropping implants. There were photos of NSA employees opening...Bruce Schneier From Schneier on Security | March 20, 2015 at 07:56 AM
Right now, the book is #6 on the New York Times best-seller list in hardcover nonfiction, and #13 in combined print and e-book nonfiction. This is the March 22...Bruce Schneier From Schneier on Security | March 19, 2015 at 03:49 PM
New research: Max Abrahms and Philip B.K. Potter, "Explaining Terrorism: Leadership Deficits and Militant Group Tactics," International Organizations. Abstract:...Bruce Schneier From Schneier on Security | March 19, 2015 at 10:41 AM
New research: "How Polymorphic Warnings Reduce Habituation in the Brain - Insights from an fMRI Study." Abstract: Research on security warnings consistently points...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:48 AM
Spicy squid masala stir-fry. Easy and delicious. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:30 AM
The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:09 AM
Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber"...Bruce Schneier From Schneier on Security | March 18, 2015 at 05:22 AM
The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...Bruce Schneier From Schneier on Security | March 18, 2015 at 03:50 AM