From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Euprymna brenneri was discovered in the waters of Okinawa. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | December 27, 2019 at 05:13 PM
Interesting story of how a Chinese state-sponsored hacking group is bypassing the RSA SecurID two-factor authentication system. How they did it remains unclear;...Bruce Schneier From Schneier on Security | December 26, 2019 at 07:19 AM
The smartphone messaging app ToTok is actually an Emirati spying tool: But the service, ToTok, is actually a spying tool, according to American officials familiar...Bruce Schneier From Schneier on Security | December 24, 2019 at 02:13 PM
Yet another squid acronym. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | December 20, 2019 at 05:06 PM
DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five...Bruce Schneier From Schneier on Security | December 19, 2019 at 07:31 AM
This isn't a first, but I think it will be the first conviction: The GIF set off a highly unusual court battle that is expected to equip those in similar circumstances...Bruce Schneier From Schneier on Security | December 18, 2019 at 06:34 AM
New details: At the CyberwarCon conference in Arlington, Virginia, on Thursday, Microsoft security researcher Ned Moran plans to present new findings from the company's...Bruce Schneier From Schneier on Security | December 17, 2019 at 07:05 AM
Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many...Bruce Schneier From Schneier on Security | December 16, 2019 at 07:00 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at SecIT by Heise in Hannover, Germany on March 26, 2020. The list is maintained...Bruce Schneier From Schneier on Security | December 14, 2019 at 02:00 PM
Interesting stuff. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | December 13, 2019 at 05:02 PM
EFF has published a comprehensible and very readable "deep dive" into the technologies of corporate surveillance, both on the Internet and off. Well worth reading...Bruce Schneier From Schneier on Security | December 13, 2019 at 07:01 AM
Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly...Bruce Schneier From Schneier on Security | December 12, 2019 at 07:11 AM
Privacy International has published a detailed, technical examination of how data is extracted from smartphones....Bruce Schneier From Schneier on Security | December 11, 2019 at 07:19 AM
There's a serous debate on reforming Section 230 of the Communications Decency Act. I am in the process of figuring out what I believe, and this is more a place...Bruce Schneier From Schneier on Security | December 10, 2019 at 07:16 AM
Interesting taxonomy of machine-learning failures (pdf) that encompasses both mistakes and attacks, or -- in their words -- intentional and unintentional failure...Bruce Schneier From Schneier on Security | December 9, 2019 at 06:56 AM
Watchmen supporting material. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | December 6, 2019 at 05:20 PM
Andy Ellis, the CSO of Akamai, gave a great talk about the psychology of risk at the Business of Software conference this year. I've written about this before....Bruce Schneier From Schneier on Security | December 6, 2019 at 07:55 AM
Interesting story of a flawed computer voting machine and a paper ballot available for recount. All ended well, but only because of that paper backup. Vote totals...Bruce Schneier From Schneier on Security | December 5, 2019 at 07:06 AM
Carolyn McCarthy gave an excellent TEDx talk about becoming a tech policy activist. It's a powerful call for public-interest technologists....Bruce Schneier From Schneier on Security | December 4, 2019 at 07:04 AM
This just in: We are pleased to announce the factorization of RSA-240, from RSA's challenge list, and the computation of a discrete logarithm of the same size (795...Bruce Schneier From Schneier on Security | December 3, 2019 at 03:12 PM