From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The major tech companies, scared that states like California might impose actual privacy regulations, have now decided that they can better lobby the federal government...Bruce Schneier From Schneier on Security | September 28, 2018 at 02:19 PM
This one is from NIST: "Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others...Bruce Schneier From Schneier on Security | September 27, 2018 at 01:00 PM
Interesting research: In the team's experiments, one WiFi transmitter and one WiFi receiver are behind walls, outside a room in which a number of people are present...Bruce Schneier From Schneier on Security | September 27, 2018 at 08:43 AM
This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital...Bruce Schneier From Schneier on Security | September 25, 2018 at 07:50 AM
If someone has physical access to your shut-down computer, they can probably break the hard-drive's encryption. This is a "cold boot" attack, and one we thought...Bruce Schneier From Schneier on Security | September 24, 2018 at 07:52 AM
On James Island. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 21, 2018 at 05:14 PM
Lots of people are e-mailing me about this new result on the distribution of prime numbers. While interesting, it has nothing to do with cryptography. Cryptographers...Bruce Schneier From Schneier on Security | September 21, 2018 at 03:14 PM
NIST has released a new study concluding that the AES encryption standard has resulted in a $250 billion world-wide economic benefit over the past twenty years....Bruce Schneier From Schneier on Security | September 21, 2018 at 07:37 AM
Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This particular...Bruce Schneier From Schneier on Security | September 20, 2018 at 07:45 AM
Citizen Lab has published a new report about the Pegasus spyware. From a ZDNet article: The malware, known as Pegasus (or Trident), was created by Israeli cyber...Bruce Schneier From Schneier on Security | September 19, 2018 at 06:19 AM
A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of...Bruce Schneier From Schneier on Security | September 17, 2018 at 07:12 AM
Lessons learned. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 14, 2018 at 05:13 PM
It's impossible to know all the details, but my latest book seems to be selling well. Initial reviews have been really positive: Boing Boing, Financial Times, Harris...Bruce Schneier From Schneier on Security | September 14, 2018 at 03:14 PM
Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies...Bruce Schneier From Schneier on Security | September 14, 2018 at 07:15 AM
Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks...Bruce Schneier From Schneier on Security | September 13, 2018 at 10:08 AM
A security vulnerability in Belkin's Wemo Insight "smartplugs" allows hackers to not only take over the plug, but use it as a jumping-off point to attack everything...Bruce Schneier From Schneier on Security | September 12, 2018 at 07:19 AM
This is really interesting research: "BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid": Abstract: We demonstrate that an Internet of Things...Bruce Schneier From Schneier on Security | September 11, 2018 at 07:25 AM
News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....Bruce Schneier From Schneier on Security | September 7, 2018 at 05:13 PM