From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I've previously written about the serious vulnerabilities in the SS7 phone routing system. Basically, the system doesn't authenticate messages. Now, criminals are...Bruce Schneier From Schneier on Security | May 10, 2017 at 07:50 AM
Facebook published paper on the information operations it has seen, as well as some observations regarding the recent US election. It's interesting reading....Bruce Schneier From Schneier on Security | May 9, 2017 at 07:36 AM
I've previously written about ad networks using ultrasonic communications to jump from one device to another. The idea is for devices like televisions to play ultrasonic...Bruce Schneier From Schneier on Security | May 8, 2017 at 10:16 AM
In the oval squid Sepioteuthis lessoniana, males use body patterns to communicate with both females and other males: To gain insight into the visual communication...Bruce Schneier From Schneier on Security | May 5, 2017 at 05:05 PM
I've been reading a bunch of anectotal reports that the TSA is starting to scan paper separately: A passenger going through security at Kansas City International...Bruce Schneier From Schneier on Security | May 5, 2017 at 08:35 AM
LyreBird is a system that can accurately reproduce the voice of someone, given a large amount of sample inputs. It's pretty good -- listen to the demo here -- and...Bruce Schneier From Schneier on Security | May 4, 2017 at 11:31 AM
This is a good summary article about the horrible security of St. Jude pacemakers, and the history of the company not doing anything about it....Bruce Schneier From Schneier on Security | May 3, 2017 at 11:25 AM
Fitbit evidence is cited in an arrest warrant, stating that the device monitored steps by the victim after the suspect claimed she died....Bruce Schneier From Schneier on Security | May 2, 2017 at 07:13 AM
There's something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One:...Bruce Schneier From Schneier on Security | May 1, 2017 at 07:32 AM
A "mysterious squid" -- big and red -- washed up on a beach in Carteret County, North Carolina. Someone found it, still alive, and set it back in the water after...Bruce Schneier From Schneier on Security | April 28, 2017 at 05:37 PM
Researchers have configured two computers to talk to each other using a laser and a scanner. Scanners work by detecting reflected light on their glass pane. The...Bruce Schneier From Schneier on Security | April 28, 2017 at 01:48 PM
There has been a flurry of research into using the various sensors on your phone to steal data in surprising ways. Here's another: using the phone's ambient light...Bruce Schneier From Schneier on Security | April 28, 2017 at 07:17 AM
Interesting paper: "The rise of reading analytics and the emerging calculus of reading privacy in the digital world," by Clifford Lynch: Abstract: This paper studies...Bruce Schneier From Schneier on Security | April 27, 2017 at 07:20 AM
There's a really interesting new paper analyzing over 100 different cyber insurance policies. From the abstract: In this research paper, we seek to answer fundamental...Bruce Schneier From Schneier on Security | April 26, 2017 at 07:14 AM
Ad blockers represent the largest consumer boycott in human history. They're also an arms race between the blockers and the blocker blockers. This article discusses...Bruce Schneier From Schneier on Security | April 25, 2017 at 01:07 PM
Wow, is this cool. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | April 21, 2017 at 06:04 PM
The US Drug Enforcement Agency has purchased zero-day exploits from the cyberweapons arms manufacturer Hacking Team. BoingBoing post....Bruce Schneier From Schneier on Security | April 20, 2017 at 03:21 PM
This is impressive: The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to...Bruce Schneier From Schneier on Security | April 20, 2017 at 08:41 AM