From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research: In this study, the optic lobe of a giant squid (Architeuthis dux, male, mantle length 89 cm), which was caught by local fishermen off the northeastern...Bruce Schneier From Schneier on Security | July 28, 2017 at 05:00 PM
I attended the National Restaurant Association exposition in Chicago earlier this year, and looked at all the ways modern restaurant IT is spying on people. But...Bruce Schneier From Schneier on Security | July 28, 2017 at 03:20 PM
In April, the Shadow Brokers -- presumably Russia -- released a batch of Windows exploits from what is presumably the NSA. Included in that release were eight different...Bruce Schneier From Schneier on Security | July 28, 2017 at 07:16 AM
The Armatix IP1 "smart gun" can only be fired by someone who is wearing a special watch. Unfortunately, this security measure is easily hackable....Bruce Schneier From Schneier on Security | July 27, 2017 at 07:14 AM
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects....Bruce Schneier From Schneier on Security | July 26, 2017 at 07:06 AM
Policy essay: "Encryption Substitutes," by Andrew Keane Woods: In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I...Bruce Schneier From Schneier on Security | July 25, 2017 at 07:52 AM
The US Army Research Agency is funding research into autonomous bot swarms. From the announcement: The objective of this CRA is to perform enabling basic and applied...Bruce Schneier From Schneier on Security | July 24, 2017 at 07:39 AM
It's the second in two months. Video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...Bruce Schneier From Schneier on Security | July 21, 2017 at 05:33 PM
The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number...Bruce Schneier From Schneier on Security | July 21, 2017 at 07:23 AM
The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they're not a result of a cryptographic failure in the currencies, but...Bruce Schneier From Schneier on Security | July 20, 2017 at 10:12 AM
Slashdot asks if password masking -- replacing password characters with asterisks as you type them -- is on the way out. I don't know if that's true, but I would...Bruce Schneier From Schneier on Security | July 19, 2017 at 11:35 AM
Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering...Bruce Schneier From Schneier on Security | July 18, 2017 at 07:38 AM
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm...Bruce Schneier From Schneier on Security | July 17, 2017 at 07:29 AM
They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But...Bruce Schneier From Schneier on Security | July 14, 2017 at 05:35 PM
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes...Bruce Schneier From Schneier on Security | July 14, 2017 at 01:06 PM
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....Bruce Schneier From Schneier on Security | July 14, 2017 at 07:51 AM
I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...Bruce Schneier From Schneier on Security | July 13, 2017 at 07:06 AM
"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...Bruce Schneier From Schneier on Security | July 12, 2017 at 07:32 AM
This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...Bruce Schneier From Schneier on Security | July 10, 2017 at 07:04 AM