From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There is an unpatchable vulnerability that affects most modern cars. It's buried in the Controller Area Network (CAN): Researchers say this flaw is not a vulnerability...Bruce Schneier From Schneier on Security | August 18, 2017 at 07:40 AM
The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus...Bruce Schneier From Schneier on Security | August 17, 2017 at 07:12 AM
One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets -- or misinterprets -- in...Bruce Schneier From Schneier on Security | August 15, 2017 at 07:00 AM
This video purports to be a bank robbery in Kiev. He first threatens a teller, who basically ignores him because she's behind bullet-proof glass. But then the robber...Bruce Schneier From Schneier on Security | August 14, 2017 at 07:03 AM
Details on how a squid's eye corrects for underwater distortion: Spherical lenses, like the squids', usually can't focus the incoming light to one point as it passes...Bruce Schneier From Schneier on Security | August 11, 2017 at 05:24 PM
I seem to have a LinkedIn account. This comes as a surprise, since I don't have a LinkedIn account, and have never logged in to LinkedIn. Does anyone have any contacts...Bruce Schneier From Schneier on Security | August 11, 2017 at 03:34 PM
Researchers found that they could confuse the road sign detection algorithms of self-driving cars by adding stickers to the signs on the road. They could, for example...Bruce Schneier From Schneier on Security | August 11, 2017 at 07:31 AM
For once, the real story isn't as bad as it seems. A researcher has figured out how to install malware onto an Echo that causes it to stream audio back to a remote...Bruce Schneier From Schneier on Security | August 10, 2017 at 02:54 PM
Richard Ledgett -- a former Deputy Director of the NSA -- argues against the US government disclosing all vulnerabilities: Proponents argue that this would allow...Bruce Schneier From Schneier on Security | August 9, 2017 at 07:40 AM
Interesting story about Uber drivers who have figured out how to game the company's algorithms to cause surge pricing: According to the study. drivers manipulate...Bruce Schneier From Schneier on Security | August 8, 2017 at 10:35 AM
Interesting story: The venture is built on Alex's talent for reverse engineering the algorithms -- known as pseudorandom number generators, or PRNGs -- that govern...Bruce Schneier From Schneier on Security | August 7, 2017 at 07:00 AM
I never imagined that there would be fake news about squid. (That website lets you write your own stories.) As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | August 4, 2017 at 05:24 PM
Attackers used a vulnerability in an Internet-connected fish tank to successfully penetrate a casino's network. BoingBoing post....Bruce Schneier From Schneier on Security | August 4, 2017 at 07:22 AM
Rumor is that the Trump administration will separate the NSA and US Cyber Command. I have long thought this was a good idea. Here's a good discussion of what it...Bruce Schneier From Schneier on Security | August 3, 2017 at 07:29 AM
Last week, DefCon hosted a "Voter Hacker Village" event. Every single voting machine there was easily hackable. Here are detailed details. There should be a summary...Bruce Schneier From Schneier on Security | August 2, 2017 at 01:59 PM
Researchers are developing technologies that can detect IMSI-catchers: those fake cell phone towers that can be used to surveil people in the area. This is good...Bruce Schneier From Schneier on Security | August 2, 2017 at 08:39 AM
Back in 2013, Der Spiegel reported that the NSA intercepts and collects Windows bug reports: One example of the sheer creativity with which the TAO spies approach...Bruce Schneier From Schneier on Security | August 1, 2017 at 07:00 AM
Articles about serious vulnerabilities in IoT devices and embedded systems are now dime-a-dozen. This one concerns Internet-connected car washes: A group of security...Bruce Schneier From Schneier on Security | August 1, 2017 at 06:47 AM
Robots can crack safes faster than humans -- and differently: So Seidle started looking for shortcuts. First he found that, like many safes, his SentrySafe had...Bruce Schneier From Schneier on Security | July 31, 2017 at 01:19 PM
New paper: "Taking Stock: Estimating Vulnerability Rediscovery," by Trey Herr, Bruce Schneier, and Christopher Morris: Abstract: How often do multiple, independent...Bruce Schneier From Schneier on Security | July 31, 2017 at 06:59 AM