From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a fascinating article about a bait-and-switch Airbnb fraud. The article focuses on one particular group of scammers and how they operate, using the fact...Bruce Schneier From Schneier on Security | November 6, 2019 at 07:19 AM
This essay discusses the futility of opting out of surveillance, and suggests data obfuscation as an alternative. We can apply obfuscation in our own lives by using...Bruce Schneier From Schneier on Security | November 5, 2019 at 07:15 AM
Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest...Bruce Schneier From Schneier on Security | November 4, 2019 at 07:06 AM
Research paper: "Triassic Kraken: The Berlin Ichthyosaur Death Assemblage Interpreted as a Giant Cephalopod Midden": Abstract: The Luning Formation at Berlin Ichthyosaur...Bruce Schneier From Schneier on Security | November 1, 2019 at 05:12 PM
Kathryn Waldron at R Street has collected all of the different resources and methodologies for measuring cybersecurity....Bruce Schneier From Schneier on Security | November 1, 2019 at 07:27 AM
Interesting story. I always recommend using a random number generator like Fortuna, even if you're using a hardware random source. It's just safer....Bruce Schneier From Schneier on Security | October 31, 2019 at 07:24 AM
WhatsApp is suing the Israeli cyberweapons arms manufacturer NSO Group in California court: WhatsApp's lawsuit, filed in a California court on Tuesday, has demanded...Bruce Schneier From Schneier on Security | October 30, 2019 at 10:36 AM
The Carnegie Endowment for Peace published a comprehensive report on ICT (information and communication technologies) supply-chain security and integrity. It's...Bruce Schneier From Schneier on Security | October 29, 2019 at 07:09 AM
In an extraordinary essay, the former FBI general counsel Jim Baker makes the case for strong encryption over government-mandated backdoors: In the face of congressional...Bruce Schneier From Schneier on Security | October 28, 2019 at 07:22 AM
Interesting article and paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | October 25, 2019 at 05:04 PM
The US Department of Justice unraveled a dark web child-porn website, leading to the arrest of 337 people in at least 18 countries. This was all accomplished not...Bruce Schneier From Schneier on Security | October 25, 2019 at 07:14 AM
This is really interesting: "A Data-Driven Reflection on 36 Years of Security and Privacy Research," by Aniqua Baset and Tamara Denning: Abstract: Meta-research...Bruce Schneier From Schneier on Security | October 24, 2019 at 07:21 AM
There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that...Bruce Schneier From Schneier on Security | October 23, 2019 at 07:15 AM
Coming out of the Privacy Commissioners' Conference in Albania, Public Voice is launching a petition for an international moratorium on using facial recognition...Bruce Schneier From Schneier on Security | October 22, 2019 at 11:12 AM
NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard....Bruce Schneier From Schneier on Security | October 22, 2019 at 06:56 AM
Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence...Bruce Schneier From Schneier on Security | October 21, 2019 at 07:23 AM
It's likely the diamondback squid. There's a video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | October 18, 2019 at 05:11 PM
Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest...Bruce Schneier From Schneier on Security | October 18, 2019 at 03:38 PM
Interesting proof of concept: At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept...Bruce Schneier From Schneier on Security | October 18, 2019 at 06:54 AM
This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network...Bruce Schneier From Schneier on Security | October 17, 2019 at 07:08 AM