From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Mike Stay broke an old zipfile encryption algorithm to recover $300,000 in bitcoin. DefCon talk here....Bruce Schneier From Schneier on Security | August 12, 2020 at 07:08 AM
The Wall Street Journal has an article about a company called Anomaly Six LLC that has an SDK that's used by "more than 500 mobile applications." Through that SDK...Bruce Schneier From Schneier on Security | August 11, 2020 at 07:00 AM
Yet another Internet-connected door lock is insecure: Sold by retailers including Amazon, Walmart, and Home Depot, U-Tec's $139.99 UltraLoq is marketed as a "secure...Bruce Schneier From Schneier on Security | August 10, 2020 at 07:23 AM
There's a new SQUID: A new device that relies on flowing clouds of ultracold atoms promises potential tests of the intersection between the weirdness of the quantum...Bruce Schneier From Schneier on Security | August 7, 2020 at 05:08 PM
The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely...Bruce Schneier From Schneier on Security | August 6, 2020 at 01:15 PM
The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic....Bruce Schneier From Schneier on Security | August 4, 2020 at 07:02 AM
Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first...Bruce Schneier From Schneier on Security | August 3, 2020 at 12:54 PM
A 17-year-old Florida boy was arrested and charged with last week's Twitter hack. News articles. Boing Boing post. Florida state attorney press release. This is...Bruce Schneier From Schneier on Security | July 31, 2020 at 05:03 PM
Researchers are synthesizing squid proteins to create a face mask that better survives cleaning. (And you thought there was no connection between squid and COVID...Bruce Schneier From Schneier on Security | July 31, 2020 at 05:00 PM
Notice the copy of Data and Goliath just behind the head of Maine Senator Angus King. This demonstrates the importance of a vibrant color and a large font....Bruce Schneier From Schneier on Security | July 31, 2020 at 03:04 PM
Fireeye is reporting that a hacking group called Ghostwriter broke into the content management systems of Eastern European news sites to plant fake stories. From...Bruce Schneier From Schneier on Security | July 30, 2020 at 03:56 PM
The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors...Bruce Schneier From Schneier on Security | July 28, 2020 at 07:40 AM
In Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image...Bruce Schneier From Schneier on Security | July 27, 2020 at 10:46 AM
The Kraken is the name of Seattle's new NFL franchise. I have always really liked collective nouns as sports team names (like the Utah Jazz or the Minnesota Wild)...Bruce Schneier From Schneier on Security | July 24, 2020 at 05:07 PM
NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to encryption and data protection...Bruce Schneier From Schneier on Security | July 24, 2020 at 07:36 AM
I just co-authored a paper on the legal risks of doing machine learning research, given the current state of the Computer Fraud and Abuse Act: Abstract: Adversarial...Bruce Schneier From Schneier on Security | July 23, 2020 at 07:03 AM
Fawkes is a system for manipulating digital images so that they aren't recognized by facial recognition systems. At a high level, Fawkes takes your personal images...Bruce Schneier From Schneier on Security | July 22, 2020 at 10:12 AM
This hack targets the firmware on modern power supplies. (Yes, power supplies are also computers.) Normally, when a phone is connected to a power brick with support...Bruce Schneier From Schneier on Security | July 21, 2020 at 07:09 AM
Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the...Bruce Schneier From Schneier on Security | July 20, 2020 at 09:49 AM
Headline: "Dozens of squid found on Provincetown sandbar." Slow news day. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | July 17, 2020 at 05:13 PM