From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This seems to be an identity theft first: Criminals used artificial intelligence-based software to impersonate a chief executive's voice and demand a fraudulent...Bruce Schneier From Schneier on Security | September 12, 2019 at 07:04 AM
The Carnegie Endowment for International Peace and Princeton University's Center for Information Technology Policy convened an Encryption Working Group to attempt...Bruce Schneier From Schneier on Security | September 11, 2019 at 07:11 AM
Good paper on cybersecurity insurance: both the history and the promise for the future. From the conclusion: Policy makers have long held high hopes for cyber insurance...Bruce Schneier From Schneier on Security | September 10, 2019 at 07:23 AM
It's not perfume for squids. Nor is it perfume made from squids. It's a perfume called Squid, "inspired by life in the sea." As usual, you can also use this squid...Bruce Schneier From Schneier on Security | September 6, 2019 at 05:24 PM
Many GPS trackers are shipped with the default password 123456. Many users don't change them. We just need to eliminate default passwords. This is an easy win.....Bruce Schneier From Schneier on Security | September 6, 2019 at 07:10 AM
A decade ago, the Doghouse was a regular feature in both my email newsletter Crypto-Gram and my blog. In it, I would call out particularly egregious -- and amusing...Bruce Schneier From Schneier on Security | September 5, 2019 at 06:58 AM
Good article in the Washington Post on all the surveillance associated with credit card use....Bruce Schneier From Schneier on Security | September 4, 2019 at 07:22 AM
China is being blamed for a massive surveillance operation that targeted Uyghur Muslims. This story broke in waves, the first wave being about the iPhone. Earlier...Bruce Schneier From Schneier on Security | September 3, 2019 at 07:09 AM
A group of scientists conclude that it's shifting weather patterns and ocean conditions. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | August 30, 2019 at 05:09 PM
Interesting paper by Michael Schwarz, Samuel Weiser, Daniel Gruss. The upshot is that both Intel and AMD have assumed that trusted enclaves will run only trustworthy...Bruce Schneier From Schneier on Security | August 30, 2019 at 07:18 AM
Voice systems are increasingly using AI techniques to determine emotion. A new paper describes an AI-based countermeasure to mask emotion in spoken words. Their...Bruce Schneier From Schneier on Security | August 29, 2019 at 07:17 AM
The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that's...Bruce Schneier From Schneier on Security | August 28, 2019 at 07:14 AM
Interesting analysis of the possibility, feasibility, and efficacy of deliberately fake scientific research, something I had previously speculated about....Bruce Schneier From Schneier on Security | August 27, 2019 at 06:14 AM
Modern credit card skimmers hidden in self-service gas pumps communicate via Bluetooth. There's now an app that can detect them: The team from the University of...Bruce Schneier From Schneier on Security | August 26, 2019 at 07:41 AM
It's always nice when I can combine squid and security: Multiple versions of the Squid web proxy cache server built with Basic Authentication features are currently...Bruce Schneier From Schneier on Security | August 23, 2019 at 07:19 PM
There was a DefCon talk by someone with the vanity plate "NULL." The California system assigned him every ticket with no license plate: $12,000. Although the initial...Bruce Schneier From Schneier on Security | August 23, 2019 at 07:19 AM
From DefCon: At the Defcon hacker conference today, security researcher Truman Kain debuted what he calls the Surveillance Detection Scout. The DIY computer fits...Bruce Schneier From Schneier on Security | August 22, 2019 at 06:21 AM
There's no indication that this vulnerability was ever used in the wild, but the code it was discovered in -- Microsoft's Text Services Framework -- has been around...Bruce Schneier From Schneier on Security | August 21, 2019 at 07:46 AM
Excellent op-ed on the growing trend to tie humanitarian aid to surveillance. Despite the best intentions, the decision to deploy technology like biometrics is...Bruce Schneier From Schneier on Security | August 20, 2019 at 07:45 AM