From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Influence operations are elusive to define. The Rand Corp.'s definition is as good as any: "the collection of tactical information about an adversary as well as...Bruce Schneier From Schneier on Security | August 19, 2019 at 07:14 AM
Interesting research: The squid robot is powered primarily by compressed air, which it stores in a cylinder in its nose (do squids have noses?). The fins and arms...Bruce Schneier From Schneier on Security | August 16, 2019 at 05:05 PM
Boeing left its software unprotected, and researchers have analyzed it for vulnerabilities: At the Black Hat security conference today in Las Vegas, Santamarta,...Bruce Schneier From Schneier on Security | August 16, 2019 at 07:12 AM
Apple's FaceID has a liveness detection feature, which prevents someone from unlocking a victim's phone by putting it in front of his face while he's sleeping....Bruce Schneier From Schneier on Security | August 15, 2019 at 07:19 AM
Several high-security electronic locks are vulnerable to side-channel attacks involving power monitoring....Bruce Schneier From Schneier on Security | August 14, 2019 at 01:36 PM
Last month, Attorney General William Barr gave a major speech on encryption policywhat is commonly known as "going dark." Speaking at Fordham University in New...Bruce Schneier From Schneier on Security | August 14, 2019 at 07:18 AM
A researcher abused the GDPR to get information on his fiancee: It is one of the first tests of its kind to exploit the EU's General Data Protection Regulation...Bruce Schneier From Schneier on Security | August 13, 2019 at 07:17 AM
Interesting analysis: "Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?" by Susan Landau and Asaf Lubin...Bruce Schneier From Schneier on Security | August 12, 2019 at 07:14 AM
Great video of the Sinuous Asperoteuthis Mangoldae Squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | August 9, 2019 at 05:12 PM
Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. Security vulnerabilities in the update...Bruce Schneier From Schneier on Security | August 8, 2019 at 12:11 PM
This wasn't a small operation: A Pakistani man bribed AT&T call-center employees to install malware and unauthorized hardware as part of a scheme to fraudulently...Bruce Schneier From Schneier on Security | August 8, 2019 at 07:22 AM
I know there's a lot of politics associated with this story, but concentrate on the cybersecurity aspect for a moment. The cell phones of a thousand Brazilians,...Bruce Schneier From Schneier on Security | August 7, 2019 at 11:48 AM
Interesting article on people using banks of smartphones to commit ad fraud for profit. No one knows how prevalent ad fraud is on the Internet. I believe it is...Bruce Schneier From Schneier on Security | August 6, 2019 at 07:20 AM
Siena Anstis, Ronald J. Deibert, John Scott-Railton of Citizen Lab published an editorial calling for regulating the international trade in commercial surveillance...Bruce Schneier From Schneier on Security | August 5, 2019 at 10:14 AM
Really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | August 2, 2019 at 05:20 PM
Yesterday, I blogged about a Facebook plan to backdoor WhatsApp by adding client-side scanning and filtering. It seems that I was wrong, and there are no such plans...Bruce Schneier From Schneier on Security | August 2, 2019 at 03:18 PM
There's a really interesting video of protesters in Hong Kong using some sort of laser to disable security cameras. I know nothing more about the technologies involved...Bruce Schneier From Schneier on Security | August 2, 2019 at 12:53 PM
Rebecca Wexler has an interesting op-ed about an inadvertent harm that privacy laws can cause: while law enforcement can often access third-party data to aid in...Bruce Schneier From Schneier on Security | August 2, 2019 at 07:04 AM
This article points out that Facebook's planned content moderation scheme will result in an encryption backdoor into WhatsApp: In Facebook's vision, the actual...Bruce Schneier From Schneier on Security | August 1, 2019 at 07:51 AM
In this piece of research, attackers successfully attack a driverless car system -- Renault Captur's "Level 0" autopilot (Level 0 systems advise human drivers but...Bruce Schneier From Schneier on Security | July 31, 2019 at 07:46 AM