From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Apparently, a nation-state hacked Alaska’s Department of Health and Social Services.
Not sure why Alaska’s Department of Health and Social Services is of any interest...Bruce Schneier From Schneier on Security | September 20, 2021 at 06:08 PM
You can find ram’s horn squid shells on beaches in Texas (and presumably elsewhere).
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | September 17, 2021 at 11:46 AM
Citizen Lab released a report on a zero-click iMessage exploit that is used in NSO Group’s Pegasus spyware.
Apple patched the vulnerability; everyone needs to update...Bruce Schneier From Schneier on Security | September 16, 2021 at 04:15 PM
It’s the eyes:
The researchers note that in many cases, users can simply zoom in on the eyes of a person they suspect may not be real to spot the pupil irregularities...Bruce Schneier From Schneier on Security | September 15, 2021 at 11:31 AM
Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps.
Also see her excellent book on the topic.Bruce Schneier From Schneier on Security | September 13, 2021 at 07:41 AM
Researchers have found possible evidence of paternal care among bigfin reef squid.
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | September 9, 2021 at 05:56 PM
After being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.”Bruce Schneier From Schneier on Security | September 9, 2021 at 05:53 PM
We knew the basics of this story, but it’s good to have more detail.
Here’s me in 2015 about this Juniper hack. Here’s me in 2007 on the NSA backdoor.Bruce Schneier From Schneier on Security | September 7, 2021 at 02:17 PM
Isracard used a single cell phone to communicate with credit card clients, and receive documents via WhatsApp. An employee stole the phone. He reformatted the SIM...Bruce Schneier From Schneier on Security | September 6, 2021 at 05:03 PM
Normal-looking cables (USB-C, Lightning, and so on) that exfiltrate data over a wireless network.
I blogged about a previous prototype hereBruce Schneier From Schneier on Security | September 3, 2021 at 02:16 PM
Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones.
The good news is that...Bruce Schneier From Schneier on Security | September 3, 2021 at 02:13 PM
Jon D. Paul has written the fascinating story of the HX-63, a super-complicated electromechanical rotor cipher machine made by Crypto AG.Bruce Schneier From Schneier on Security | September 3, 2021 at 11:19 AM
Citizen Lab is reporting on two zero-click iMessage exploits, in spyware sold by the cyberweapons arms manufacturer NSO Group to the Bahraini government.
Thesehere...Bruce Schneier From Schneier on Security | August 31, 2021 at 04:17 PM
Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index...Bruce Schneier From Schneier on Security | August 30, 2021 at 04:40 PM
Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.Bruce Schneier From Schneier on Security | August 27, 2021 at 11:33 AM
Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security.
I’ve lost count of how many times T-Mobile has been hacked.Bruce Schneier From Schneier on Security | August 27, 2021 at 09:37 AM
Interesting article on squid communication.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read...Bruce Schneier From Schneier on Security | August 26, 2021 at 01:57 PM
It’s pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | August 26, 2021 at 01:55 PM
If you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software — which automatically...Bruce Schneier From Schneier on Security | August 25, 2021 at 11:52 PM