From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Ever since The Intercept published this story about the US government's Terrorist Screening Database, the press has been writing about a "second leaker": The Intercept...Bruce Schneier From Schneier on Security | August 7, 2014 at 01:24 PM
I've been doing way too many media interviews over this weird New York Times story that a Russian criminal gang has stolen over 1.2 billion passwords. As expected...Bruce Schneier From Schneier on Security | August 7, 2014 at 08:46 AM
Network-attached storage devices made by Synology are being attacked, and their data encrypted, by ransomware that demands $350 in bitcoins (payable anonymously...Bruce Schneier From Schneier on Security | August 4, 2014 at 06:01 PM
Former NSA Director Keith Alexander is patenting a variety of techniques to protect computer networks. We're supposed to believe that he developed these on his...Bruce Schneier From Schneier on Security | August 4, 2014 at 07:26 AM
A nebula that looks like a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | August 3, 2014 at 11:10 PM
Here are all the NSA's patents, in one searchable database. If you find something good, tell us all in the comments....Bruce Schneier From Schneier on Security | August 1, 2014 at 07:54 AM
This is pretty impressive: Most of us learned long ago not to run executable files from sketchy USB sticks. But old-fashioned USB hygiene can't stop this newer...Bruce Schneier From Schneier on Security | July 31, 2014 at 03:31 PM
Clever: Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions...Bruce Schneier From Schneier on Security | July 31, 2014 at 07:56 AM
New America Foundation has a new paper on the costs of NSA surveillance: economic costs to US business, costs to US foreign policy, and costs to security. News...Bruce Schneier From Schneier on Security | July 29, 2014 at 01:54 PM
There was a conference on deception earlier this month. Sophie Van Der Zee has a summary of the sessions....Bruce Schneier From Schneier on Security | July 29, 2014 at 07:50 AM
Russia has put out a tender on its official government procurement website for anyone who can identify Tor users. The reward of $114,000 seems pretty cheap for...Bruce Schneier From Schneier on Security | July 28, 2014 at 08:00 AM
An interactive animation from the Museum of New Zealand Te Papa Tongarewa. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | July 25, 2014 at 05:46 PM
Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there's no reason this can't scale to much larger numbers...Bruce Schneier From Schneier on Security | July 25, 2014 at 11:35 AM
A group of hackers are using a vulnerability in the Next thermostat to secure it against Nest's remote data collection....Bruce Schneier From Schneier on Security | July 22, 2014 at 11:46 AM
Here's a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly...Bruce Schneier From Schneier on Security | July 21, 2014 at 04:38 PM
A six-hour video of a giant squid dissection from Auckland University of Technology. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | July 18, 2014 at 05:35 PM
The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...Bruce Schneier From Schneier on Security | July 17, 2014 at 04:54 PM