From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Researchers build a covert channel between two virtual machines using a shared cache....Bruce Schneier From Schneier on Security | April 18, 2017 at 06:58 AM
Since Edward Snowden revealed to the world the extent of the NSA's global surveillance network, there has been a vigorous debate in the technological community...Bruce Schneier From Schneier on Security | April 17, 2017 at 07:21 AM
In another symptom of climate change, Chile's largest squid producer "plans to diversify its offering in the future, selling sea urchin, cod and octopus, to compensate...Bruce Schneier From Schneier on Security | April 14, 2017 at 05:25 PM
Carnegie Mellon University has released a comprehensive list of C++ secure-coding best practices....Bruce Schneier From Schneier on Security | April 14, 2017 at 08:20 AM
I regularly say that, on the Internet, attack is easier than defense. There are a bunch of reasons for this, but primarily it's 1) the complexity of modern networked...Bruce Schneier From Schneier on Security | April 13, 2017 at 06:45 AM
Interesting paper: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams": Abstract: In technical support scams, cybercriminals attempt to convince...Bruce Schneier From Schneier on Security | April 12, 2017 at 07:34 AM
There's a new malware called BrickerBot that permanently disables vulnerable IoT devices by corrupting their storage capability and reconfiguring kernel parameters...Bruce Schneier From Schneier on Security | April 11, 2017 at 09:22 AM
WikiLeaks is obviously playing their Top Secret CIA data cache for as much press as they can, leaking the documents a little at a time. On Friday they published...Bruce Schneier From Schneier on Security | April 10, 2017 at 03:16 PM
Last August, an unknown group called the Shadow Brokers released a bunch of NSA tools to the public. The common guesses were that the tools were discovered on an...Bruce Schneier From Schneier on Security | April 10, 2017 at 06:51 AM
This is just plain weird: Rosenthal, a neurobiologist at the Marine Biological Laboratory, was a grad student studying a specific protein in squid when he got an...Bruce Schneier From Schneier on Security | April 7, 2017 at 05:16 PM
NSA Deputy Director Richard Ledgett described a 2014 Russian cyber attack against the U.S. State Department as "hand-to-hand" combat: "It was hand-to-hand combat...Bruce Schneier From Schneier on Security | April 7, 2017 at 09:06 AM
There's ablog post from Google's Project Zero detailing an attack against Android phones over Wi-Fi. From Ars Technica: The vulnerability resides in a widely used...Bruce Schneier From Schneier on Security | April 6, 2017 at 08:52 AM
There's a new report of a nation-state attack, presumed to be from China, on a series of managed ISPs. From the executive summary: Since late 2016, PwC UK and BAE...Bruce Schneier From Schneier on Security | April 5, 2017 at 11:42 AM
This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack...Bruce Schneier From Schneier on Security | April 5, 2017 at 07:29 AM
Interesting law journal article: "Encryption and the Press Clause," by D. Victoria Barantetsky. Abstract: Almost twenty years ago, a hostile debate over whether...Bruce Schneier From Schneier on Security | April 4, 2017 at 03:14 PM
Interesting acoustic attack against the MEMS accelerometers in devices like FitBits. Millions of accelerometers reside inside smartphones, automobiles, medical...Bruce Schneier From Schneier on Security | April 4, 2017 at 07:23 AM
Not content with having a fleet of insecure surveillance drones, the state of Connecticut wants a fleet of insecure weaponized drones. What could possibly go wrong...Bruce Schneier From Schneier on Security | April 3, 2017 at 07:30 AM
Great Victorian animal-combat scene featuring a giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | March 31, 2017 at 05:29 PM