From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A paper I co-wrote was just published in Security Journal: "Superheroes on screen: real life lessons for security debates": Abstract: Superhero films and episodic...Bruce Schneier From Schneier on Security | September 27, 2019 at 01:19 PM
The trade war with China has reached a new industry: subway cars. Congress is considering legislation that would prevent the world's largest train maker, the Chinese...Bruce Schneier From Schneier on Security | September 26, 2019 at 07:21 AM
This article discusses an e-commerce fraud technique in the UK. Because the Royal Mail only tracks packages to the postcode -- and not to the address - it's possible...Bruce Schneier From Schneier on Security | September 25, 2019 at 07:01 AM
Yahoo News reported that the Russians have successfully targeted an FBI communications system: American officials discovered that the Russians had dramatically...Bruce Schneier From Schneier on Security | September 24, 2019 at 07:33 AM
Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power...Bruce Schneier From Schneier on Security | September 23, 2019 at 07:34 AM
In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains...Bruce Schneier From Schneier on Security | September 23, 2019 at 06:59 AM
Another piglet squid video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | September 20, 2019 at 05:11 PM
Earlier this month I made fun of a company called Crown-Sterling, for...for...for being a company that deserves being made fun of. This morning, the company announced...Bruce Schneier From Schneier on Security | September 20, 2019 at 01:50 PM
This article discusses new types of biometrics under development, including gait, scent, heartbeat, microbiome, and butt shape (no, really)....Bruce Schneier From Schneier on Security | September 20, 2019 at 07:12 AM
I previously blogged about a Black Hat talk that disclosed security vulnerabilities in the Boeing 787 software. Ben Rothke concludes that the vulnerabilities are...Bruce Schneier From Schneier on Security | September 19, 2019 at 06:57 AM
I am in search of a strategic thought partner: a person who can work closely with me over the next 9 to 12 months in assessing what's needed to advance the practice...Bruce Schneier From Schneier on Security | September 18, 2019 at 01:52 PM
Expandpass is a string expansion program. It's "useful for cracking passwords you kinda-remember." You tell the program what you remember about the password and...Bruce Schneier From Schneier on Security | September 18, 2019 at 08:42 AM
Not that serious, but interesting: In late 2011, Intel introduced a performance enhancement to its line of server processors that allowed network cards and other...Bruce Schneier From Schneier on Security | September 16, 2019 at 07:39 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at University College London on September 23, 2019. I'm speaking at World's Top 50...Bruce Schneier From Schneier on Security | September 14, 2019 at 07:16 PM
In June, I blogged about a video of a live juvenile giant squid. Here's how that video was captured. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | September 13, 2019 at 05:05 PM
All of life is based on the coordinated action of genetic parts (genes and their controlling sequences) found in the genomes (the complete DNA sequence) of organisms...Bruce Schneier From Schneier on Security | September 13, 2019 at 12:40 PM
The Independent Commission on Examination Malpractice in the UK has recommended that all watches be banned from exam rooms, basically because it's becoming very...Bruce Schneier From Schneier on Security | September 13, 2019 at 09:22 AM
This seems to be an identity theft first: Criminals used artificial intelligence-based software to impersonate a chief executive's voice and demand a fraudulent...Bruce Schneier From Schneier on Security | September 12, 2019 at 07:04 AM
The Carnegie Endowment for International Peace and Princeton University's Center for Information Technology Policy convened an Encryption Working Group to attempt...Bruce Schneier From Schneier on Security | September 11, 2019 at 07:11 AM
Good paper on cybersecurity insurance: both the history and the promise for the future. From the conclusion: Policy makers have long held high hopes for cyber insurance...Bruce Schneier From Schneier on Security | September 10, 2019 at 07:23 AM