From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized...Bruce Schneier From Schneier on Security | March 1, 2017 at 07:53 AM
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered: On the technical front, what the app is...Bruce Schneier From Schneier on Security | March 1, 2017 at 07:02 AM
We all should be concerned about the privacy settings in Windows 10. And we should be glad that the EU has the regulatory authority to do something about it....Bruce Schneier From Schneier on Security | February 28, 2017 at 07:25 AM
At a talk last week, the head of US Cyber Command and the NSA Mike Rogers talked about the US buying cyberweapons from arms manufacturers. "In the application of...Bruce Schneier From Schneier on Security | February 27, 2017 at 03:28 PM
This is an excellent survey article on modern propaganda techniques, how they work, and how we might defend ourselves against them. Cory Doctorow summarizes the...Bruce Schneier From Schneier on Security | February 27, 2017 at 07:24 AM
A short SF story in a tweet. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 24, 2017 at 05:24 PM
Last November, I gave a talk at the TEDMED Conference on health and medical data privacy. The talk is online...Bruce Schneier From Schneier on Security | February 24, 2017 at 02:36 PM
The Intercept has a long article on the relationship between Palantir Technologies and the NSA, based on the Snowden documents....Bruce Schneier From Schneier on Security | February 24, 2017 at 07:26 AM
The first collision in the SHA-1 hash function has been found. This is not a surprise. We've all expected this for over a decade, watching computing power increase...Bruce Schneier From Schneier on Security | February 23, 2017 at 04:29 PM
These days, it's rare that we learn something new from the Snowden documents. But Ben Buchanan found something interesting. The NSA penetrates enemy networks in...Bruce Schneier From Schneier on Security | February 22, 2017 at 07:21 AM
This is interesting: The My Friend Cayla doll, which is manufactured by the US company Genesis Toys and distributed in Europe by Guildford-based Vivid Toy Group...Bruce Schneier From Schneier on Security | February 20, 2017 at 07:55 AM
The evolutionary reasons why the strawberry squid has two different eyes. Additional articles. Original paper. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | February 17, 2017 at 05:03 PM
Verizon's Data Brief Digest 2017 describes an attack against an unnamed university by attackers who hacked a variety of IoT devices and had them spam network targets...Bruce Schneier From Schneier on Security | February 17, 2017 at 09:30 AM
Duqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security features is that it stays resident in...Bruce Schneier From Schneier on Security | February 16, 2017 at 11:28 AM
Interesting article in Science discussing field research on how people are radicalized to become terrorists. The potential for research that can overcome existing...Bruce Schneier From Schneier on Security | February 15, 2017 at 07:31 AM
Pew Research just published their latest research data on Americans and their views on cybersecurity: This survey finds that a majority of Americans have directly...Bruce Schneier From Schneier on Security | February 14, 2017 at 07:48 AM
There's a really interesting paper from George Washington University on hacking back: "Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats...Bruce Schneier From Schneier on Security | February 13, 2017 at 07:40 AM
Interesting research. (Popular article here.) As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.....Bruce Schneier From Schneier on Security | February 10, 2017 at 05:25 PM
The Center for Strategic and International Studies (CSIS) published "From Awareness to Action: A Cybersecurity Agenda for the 45th President" (press release here)...Bruce Schneier From Schneier on Security | February 10, 2017 at 01:01 PM
Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data...Bruce Schneier From Schneier on Security | February 10, 2017 at 09:25 AM