From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The New York Times is reporting that evidence is pointing to North Korea as the author of the WannaCry ransomware. Note that there is no proof at this time, although...Bruce Schneier From Schneier on Security | May 16, 2017 at 10:32 AM
The Intercept published a story about a dedicated NSA brute-force keysearch machine being built with the help of New York University and IBM. It's based on a document...Bruce Schneier From Schneier on Security | May 16, 2017 at 07:40 AM
Interesting research: The radio signals emitted by a commercial Wi-Fi router can act as a kind of radar, providing images of the transmitter's environment, according...Bruce Schneier From Schneier on Security | May 16, 2017 at 07:08 AM
Technological advances change the world. That's partly because of what they are, but even more because of the social changes they enable. New technologies upend...Bruce Schneier From Schneier on Security | May 15, 2017 at 03:21 PM
Turns out, multi-million dollar yachts are no more secure than anything else out there: The ease with which ocean-going oligarchs or other billionaires can be hijacked...Bruce Schneier From Schneier on Security | May 15, 2017 at 07:02 AM
This article feels like hyperbole: The scam has arrived in Australia after being used in the United States and Britain. The scammer may ask several times "can you...Bruce Schneier From Schneier on Security | May 12, 2017 at 07:00 AM
Technology can do a lot more to make our elections more secure and reliable, and to ensure that participation in the democratic process is available to all. There...Bruce Schneier From Schneier on Security | May 10, 2017 at 03:14 PM
I've previously written about the serious vulnerabilities in the SS7 phone routing system. Basically, the system doesn't authenticate messages. Now, criminals are...Bruce Schneier From Schneier on Security | May 10, 2017 at 07:50 AM
Facebook published paper on the information operations it has seen, as well as some observations regarding the recent US election. It's interesting reading....Bruce Schneier From Schneier on Security | May 9, 2017 at 07:36 AM
I've previously written about ad networks using ultrasonic communications to jump from one device to another. The idea is for devices like televisions to play ultrasonic...Bruce Schneier From Schneier on Security | May 8, 2017 at 10:16 AM
In the oval squid Sepioteuthis lessoniana, males use body patterns to communicate with both females and other males: To gain insight into the visual communication...Bruce Schneier From Schneier on Security | May 5, 2017 at 05:05 PM
I've been reading a bunch of anectotal reports that the TSA is starting to scan paper separately: A passenger going through security at Kansas City International...Bruce Schneier From Schneier on Security | May 5, 2017 at 08:35 AM
LyreBird is a system that can accurately reproduce the voice of someone, given a large amount of sample inputs. It's pretty good -- listen to the demo here -- and...Bruce Schneier From Schneier on Security | May 4, 2017 at 11:31 AM
This is a good summary article about the horrible security of St. Jude pacemakers, and the history of the company not doing anything about it....Bruce Schneier From Schneier on Security | May 3, 2017 at 11:25 AM
Fitbit evidence is cited in an arrest warrant, stating that the device monitored steps by the victim after the suspect claimed she died....Bruce Schneier From Schneier on Security | May 2, 2017 at 07:13 AM
There's something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One:...Bruce Schneier From Schneier on Security | May 1, 2017 at 07:32 AM
A "mysterious squid" -- big and red -- washed up on a beach in Carteret County, North Carolina. Someone found it, still alive, and set it back in the water after...Bruce Schneier From Schneier on Security | April 28, 2017 at 05:37 PM
Researchers have configured two computers to talk to each other using a laser and a scanner. Scanners work by detecting reflected light on their glass pane. The...Bruce Schneier From Schneier on Security | April 28, 2017 at 01:48 PM
There has been a flurry of research into using the various sensors on your phone to steal data in surprising ways. Here's another: using the phone's ambient light...Bruce Schneier From Schneier on Security | April 28, 2017 at 07:17 AM