From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be...Bruce Schneier From Schneier on Security | August 25, 2021 at 11:13 AM
Interesting National Geographic article.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Readhere...Bruce Schneier From Schneier on Security | August 20, 2021 at 02:19 PM
In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here.
Apple says that hash collisions in its CSAM...Bruce Schneier From Schneier on Security | August 20, 2021 at 09:54 AM
It’s a big one:
As first reported by Motherboard on Sunday, someone on the dark web claims to have obtained the data of 100 million from T-Mobile’s servers andalso...Bruce Schneier From Schneier on Security | August 19, 2021 at 12:00 AM
Apple’s NeuralHash algorithm — the one it’s using for client-side scanning on the iPhone — has been reverse-engineered.
Turns out it was already in iOS 14.3, and...Bruce Schneier From Schneier on Security | August 18, 2021 at 12:51 PM
I’m starting to see writings about a Chinese espionage tool that exploits website vulnerabilities to try and identify Chinese dissidents.Bruce Schneier From Schneier on Security | August 17, 2021 at 04:55 PM
Improved ocean conditions are leading to optimism about this year’s squid catch.
As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | August 13, 2021 at 05:28 PM
The problem with spear phishing it that it takes time and creativity to create individualized enticing phishing emails. Researchers are using GPT-3 to attempt to...Bruce Schneier From Schneier on Security | August 12, 2021 at 04:18 PM
Cobolt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to...Bruce Schneier From Schneier on Security | August 9, 2021 at 03:44 PM
Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. I have been following the details, and discussing it in several...Bruce Schneier From Schneier on Security | August 9, 2021 at 03:41 PM
This is a really interesting story explaining how to defeat Microsoft’s TPM in 30 minutes — without having to solder anything to the motherboard.
Researchers at...Bruce Schneier From Schneier on Security | August 6, 2021 at 04:22 PM
It’s sold out, but the pictures are cute.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read...Bruce Schneier From Schneier on Security | August 6, 2021 at 04:19 PM
Fascinating research: “Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.”
Abstract: A master face is a face image that...Bruce Schneier From Schneier on Security | August 5, 2021 at 10:47 AM
The facts aren’t news, but Zoom will pay $85M — to the class-action attorneys, and to users — for lying to users about end-to-end encryption, and for giving user...Bruce Schneier From Schneier on Security | August 4, 2021 at 05:27 PM
Forbes has the story:
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to...Bruce Schneier From Schneier on Security | August 2, 2021 at 11:49 PM
Of course this is hackable:
A sophisticated telecommunications satellite that can be completely repurposed while in space has launched.
[…]
Because the satellite...Bruce Schneier From Schneier on Security | August 1, 2021 at 07:47 PM
New paper: “Encrypted Cloud Photo Storage Using Google Photos“:
Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo...Bruce Schneier From Schneier on Security | July 29, 2021 at 09:36 PM
The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs...Bruce Schneier From Schneier on Security | July 29, 2021 at 09:32 PM
Often it feels like squid just evolved better than us mammals.
As usual, you can also use this squid post to talk about the security stories in the news that Ihere...Bruce Schneier From Schneier on Security | July 29, 2021 at 02:19 PM
A teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers.these...Bruce Schneier From Schneier on Security | July 28, 2021 at 11:54 AM