From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Lots of them weren't very good: BSD co-inventor Dennis Ritchie, for instance, used "dmac" (his middle name was MacAlistair); Stephen R. Bourne, creator of the Bourne...Bruce Schneier From Schneier on Security | October 15, 2019 at 11:38 AM
This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It's interesting work, but I don't want...Bruce Schneier From Schneier on Security | October 14, 2019 at 07:58 AM
Apple fixed the squid emoji in iOS 13.1: A squid's siphon helps it move, breathe, and discharge waste, so having the siphon in back makes more sense than having...Bruce Schneier From Schneier on Security | October 11, 2019 at 05:29 PM
I just published my third collection of essays: We Have Root. This book covers essays from 2013 to 2017. (The first two are Schneier on Security and Carry On.)...Bruce Schneier From Schneier on Security | October 11, 2019 at 03:34 PM
Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers. The group's lax operational security includes...Bruce Schneier From Schneier on Security | October 11, 2019 at 07:14 AM
Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting...Bruce Schneier From Schneier on Security | October 10, 2019 at 02:49 PM
Free Wi-Fi hotspots can track your location, even if you don't connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes...Bruce Schneier From Schneier on Security | October 10, 2019 at 06:49 AM
Interesting story about someone who is almost certainly cheating at professional poker. But then I start to see things that seem so obvious, but I wonder whether...Bruce Schneier From Schneier on Security | October 9, 2019 at 01:26 PM
Interesting: German investigators said Friday they have shut down a data processing center installed in a former NATO bunker that hosted sites dealing in drugs...Bruce Schneier From Schneier on Security | October 9, 2019 at 07:34 AM
Two speakers were censored at the Australian Information Security Association's annual conference this week in Melbourne. Thomas Drake, former NSA employee and...Bruce Schneier From Schneier on Security | October 8, 2019 at 06:15 PM
A new iOS exploit allows jailbreaking of pretty much all version of the iPhone. This is a huge deal for Apple, but at least it doesn't allow someone to remotely...Bruce Schneier From Schneier on Security | October 8, 2019 at 06:24 AM
Ed Snowden has published a book of his memoirs: Permanent Record. I have not read it yet, but I want to point you all towards two pieces of writing about the book...Bruce Schneier From Schneier on Security | October 7, 2019 at 07:53 AM
Cute video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | October 4, 2019 at 05:23 PM
In 1999, I invented the Solitaire encryption algorithm, designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's...Bruce Schneier From Schneier on Security | October 4, 2019 at 01:04 PM
Long Twitter thread about the tracking embedded in modern digital televisions. The thread references three academic papers....Bruce Schneier From Schneier on Security | October 4, 2019 at 07:32 AM
In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22...Bruce Schneier From Schneier on Security | October 3, 2019 at 07:28 AM
There's some interesting new research about Russian APT malware: The Russian government has fostered competition among the three agencies, which operate independently...Bruce Schneier From Schneier on Security | October 2, 2019 at 09:00 AM
Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the...Bruce Schneier From Schneier on Security | October 1, 2019 at 07:54 AM
The United States government's continuing disagreement with the Chinese company Huawei underscores a much larger problem with computer technologies in general:...Bruce Schneier From Schneier on Security | September 30, 2019 at 07:36 AM
There's no proof they did, but there's no proof they didn't. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | September 27, 2019 at 05:23 PM