From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Fitbit evidence is cited in an arrest warrant, stating that the device monitored steps by the victim after the suspect claimed she died....Bruce Schneier From Schneier on Security | May 2, 2017 at 07:13 AM
There's something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One:...Bruce Schneier From Schneier on Security | May 1, 2017 at 07:32 AM
A "mysterious squid" -- big and red -- washed up on a beach in Carteret County, North Carolina. Someone found it, still alive, and set it back in the water after...Bruce Schneier From Schneier on Security | April 28, 2017 at 05:37 PM
Researchers have configured two computers to talk to each other using a laser and a scanner. Scanners work by detecting reflected light on their glass pane. The...Bruce Schneier From Schneier on Security | April 28, 2017 at 01:48 PM
There has been a flurry of research into using the various sensors on your phone to steal data in surprising ways. Here's another: using the phone's ambient light...Bruce Schneier From Schneier on Security | April 28, 2017 at 07:17 AM
Interesting paper: "The rise of reading analytics and the emerging calculus of reading privacy in the digital world," by Clifford Lynch: Abstract: This paper studies...Bruce Schneier From Schneier on Security | April 27, 2017 at 07:20 AM
There's a really interesting new paper analyzing over 100 different cyber insurance policies. From the abstract: In this research paper, we seek to answer fundamental...Bruce Schneier From Schneier on Security | April 26, 2017 at 07:14 AM
Ad blockers represent the largest consumer boycott in human history. They're also an arms race between the blockers and the blocker blockers. This article discusses...Bruce Schneier From Schneier on Security | April 25, 2017 at 01:07 PM
Wow, is this cool. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | April 21, 2017 at 06:04 PM
The US Drug Enforcement Agency has purchased zero-day exploits from the cyberweapons arms manufacturer Hacking Team. BoingBoing post....Bruce Schneier From Schneier on Security | April 20, 2017 at 03:21 PM
This is impressive: The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to...Bruce Schneier From Schneier on Security | April 20, 2017 at 08:41 AM
Researchers build a covert channel between two virtual machines using a shared cache....Bruce Schneier From Schneier on Security | April 18, 2017 at 06:58 AM
Since Edward Snowden revealed to the world the extent of the NSA's global surveillance network, there has been a vigorous debate in the technological community...Bruce Schneier From Schneier on Security | April 17, 2017 at 07:21 AM
In another symptom of climate change, Chile's largest squid producer "plans to diversify its offering in the future, selling sea urchin, cod and octopus, to compensate...Bruce Schneier From Schneier on Security | April 14, 2017 at 05:25 PM
Carnegie Mellon University has released a comprehensive list of C++ secure-coding best practices....Bruce Schneier From Schneier on Security | April 14, 2017 at 08:20 AM
I regularly say that, on the Internet, attack is easier than defense. There are a bunch of reasons for this, but primarily it's 1) the complexity of modern networked...Bruce Schneier From Schneier on Security | April 13, 2017 at 06:45 AM
Interesting paper: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams": Abstract: In technical support scams, cybercriminals attempt to convince...Bruce Schneier From Schneier on Security | April 12, 2017 at 07:34 AM