From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This article is reporting that the demand for Chief Information Security Officers far exceeds supply: Sony and every other company that realizes the need for a...Bruce Schneier From Schneier on Security | December 11, 2014 at 07:57 AM
Interesting article: "How terrorism fears are transforming America's public space." I am reminded of my essay from four years ago: "Close the Washington Monument...Bruce Schneier From Schneier on Security | December 10, 2014 at 12:52 PM
The Intercept has published an article -- based on the Snowden documents -- about AURORAGOLD, an NSA surveillance operation against cell phone network operators...Bruce Schneier From Schneier on Security | December 9, 2014 at 07:33 AM
Government surplus. Only $8,000 on eBay. Note that this device has been analyzed before....Bruce Schneier From Schneier on Security | December 8, 2014 at 12:52 PM
Last week, we learned about a striking piece of malware called Regin that has been infecting computer networks worldwide since 2008. It's more sophisticated than...Bruce Schneier From Schneier on Security | December 8, 2014 at 08:56 AM
There has been an increase in squid poaching by North Korea out of Japanese territorial waters. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | December 5, 2014 at 05:47 PM
In the Internet age, we have no choice but to entrust our data with private companies: e-mail providers, service providers, retailers, and so on. We realize that...Bruce Schneier From Schneier on Security | December 5, 2014 at 07:45 AM
The Denver police are using olfactometers to measure the concentration of cannabis in the air. I haven't found any technical information about these devices, their...Bruce Schneier From Schneier on Security | December 4, 2014 at 04:43 PM
This talk (and paper) describe a lattice-based public-key algorithm called Soliloquy developed by GCHQ, and a quantum-computer attack on it. News article....Bruce Schneier From Schneier on Security | December 4, 2014 at 10:53 AM
Interesting essay on the future of speech recognition, microphone miniaturization, and the future ubiquity of auditory surveillance....Bruce Schneier From Schneier on Security | December 2, 2014 at 04:53 PM
This is a really good analysis of how the NSA/GCHQ spying programs actually work. It's nice that we finally have enough documents public that we can start putting...Bruce Schneier From Schneier on Security | December 1, 2014 at 07:41 AM
Squid Bikes is a California brand. Article from Velo News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | November 28, 2014 at 05:53 PM
Interesting paper: "Security Collapse of the HTTPS Market." From the conclusion: Recent breaches at CAs have exposed several systemic vulnerabilities and market...Bruce Schneier From Schneier on Security | November 28, 2014 at 07:54 AM
This is an interesting paper -- the full version is behind a paywall -- about how we as humans can motivate people to cooperate with future generations. Abstract...Bruce Schneier From Schneier on Security | November 27, 2014 at 09:32 AM
A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired...Bruce Schneier From Schneier on Security | November 26, 2014 at 02:29 PM
This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...Bruce Schneier From Schneier on Security | November 26, 2014 at 07:50 AM
Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...Bruce Schneier From Schneier on Security | November 25, 2014 at 07:57 AM
Nice article on some of the security assumptions we rely on in cryptographic algorithms....Bruce Schneier From Schneier on Security | November 24, 2014 at 03:45 PM
Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....Bruce Schneier From Schneier on Security | November 24, 2014 at 07:54 AM