From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last week, Microsoft issued a security patch for Windows XP, a 16-year-old operating system that Microsoft officially no longer supports. Last month, Microsoft...Bruce Schneier From Schneier on Security | June 21, 2017 at 02:58 PM
Last week, the Department of Justice released 18 new FISC opinions related to Section 702 as part of an EFF FOIA lawsuit. (Of course, they don't mention EFF or...Bruce Schneier From Schneier on Security | June 21, 2017 at 07:12 AM
I have no comment on the politics of this stabbing attack, and only note that the attacker used a ceramic knife -- that will go through metal detectors. I have...Bruce Schneier From Schneier on Security | June 20, 2017 at 07:21 AM
Access Now has documented it being used against a Twitter user, but it also works against other social media accounts: With the Doubleswitch attack, a hijacker...Bruce Schneier From Schneier on Security | June 19, 2017 at 07:44 AM
An early preview. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | June 16, 2017 at 05:14 PM
There's evidence: Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol...Bruce Schneier From Schneier on Security | June 16, 2017 at 03:11 PM
Turns out that it's surprisingly easy to game: It appears that news sites deemed legitimate by Google News are being modified by third parties. These sites are...Bruce Schneier From Schneier on Security | June 16, 2017 at 07:42 AM
I hesitate to blog this, because it's an example of everything that's wrong with pop psychology. Malcolm Harris writes about millennials, and has a theory of why...Bruce Schneier From Schneier on Security | June 15, 2017 at 07:52 AM
This article argues that Britain's counterterrorism problem isn't lack of data, it's lack of analysis....Bruce Schneier From Schneier on Security | June 14, 2017 at 02:00 PM
Research paper: "Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone," by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract...Bruce Schneier From Schneier on Security | June 13, 2017 at 07:21 AM
New US government report: "Report on Improving Cybersecurity in the Health Care Industry." It's pretty scathing, but nothing in it will surprise regular readers...Bruce Schneier From Schneier on Security | June 12, 2017 at 10:06 AM
The more they mate, the sooner they die. Academic paper (paywall). News article. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | June 9, 2017 at 05:25 PM
This week brought new public evidence about Russian interference in the 2016 election. On Monday, the Intercept published a top-secret National Security Agency...Bruce Schneier From Schneier on Security | June 9, 2017 at 11:24 AM
Ross Anderson blogged about his new paper on security and safety concerns about the Internet of Things. (See also this short video.) It's very much along the lines...Bruce Schneier From Schneier on Security | June 8, 2017 at 08:15 AM
Interesting law-journal article: "Surveillance Intermediaries," by Alan Z. Rozenshtein. Abstract:Apple's 2016 fight against a court order commanding it to help...Bruce Schneier From Schneier on Security | June 7, 2017 at 07:19 AM
Really interesting research: "Unpacking Spear Phishing Susceptibility," by Zinaida Benenson, Freya Gassmann, and Robert Landwirth. Abstract: We report the results...Bruce Schneier From Schneier on Security | June 6, 2017 at 07:11 AM
WikiLeaks is still dumping CIA cyberweapons on the Internet. Its latest dump is something called "Pandemic": The Pandemic leak does not explain what the CIA's initial...Bruce Schneier From Schneier on Security | June 5, 2017 at 07:16 AM
There's lots of video of squid as undersea predators. This is one of the few instances of squid as prey (from a deep submersible in the Pacific): "We saw brittle...Bruce Schneier From Schneier on Security | June 2, 2017 at 05:05 PM