From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A decade ago, I wrote about the death of ephemeral conversation. As computers were becoming ubiquitous, some unintended changes happened, too. Before computers,...Bruce Schneier From Schneier on Security | March 10, 2017 at 07:15 AM
Google's Project Zero is serious about releasing the details of security vulnerabilities 90 days after they alert the vendors, even if they're unpatched. It just...Bruce Schneier From Schneier on Security | March 9, 2017 at 07:28 AM
If I had to guess right now, I'd say the documents came from an outsider and not an insider. My reasoning: One, there is absolutely nothing illegal in the contents...Bruce Schneier From Schneier on Security | March 8, 2017 at 10:08 AM
The New York Times is reporting that the US has been conducting offensive cyberattacks against North Korea, in an effort to delay its nuclear weapons program......Bruce Schneier From Schneier on Security | March 8, 2017 at 08:03 AM
WikiLeaks just released a cache of 8,761 classified CIA documents from 2012 to 2016, including details of its offensive Internet operations. I have not read through...Bruce Schneier From Schneier on Security | March 7, 2017 at 10:08 AM
Matthew Green and students speculate on what truly well-designed ransomware system could look like: Most modern ransomware employs a cryptocurrency like Bitcoin...Bruce Schneier From Schneier on Security | March 7, 2017 at 09:15 AM
Longtime Internet security-policy pioneer Howard Schmidt died on Friday. He will be missed....Bruce Schneier From Schneier on Security | March 6, 2017 at 03:15 PM
The New York Times reports that Uber developed apps that identified and blocked government regulators using the app to find evidence of illegal behavior: Yet using...Bruce Schneier From Schneier on Security | March 6, 2017 at 07:24 AM
Squid evolved during an "evolutionary war" -- the Mesozoic Marine Revolution -- about 100 million years ago. Research paper. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | March 3, 2017 at 05:16 PM
This is my talk at the RSA Conference last month. It's on regulation and the Internet of Things, along the lines of this essay. I am slowly meandering around this...Bruce Schneier From Schneier on Security | March 3, 2017 at 03:06 PM
Researchers have demonstrated how a malicious piece of software in an air-gapped computer can communicate with a nearby drone using a blinking LED on the computer...Bruce Schneier From Schneier on Security | March 3, 2017 at 07:48 AM
Summer Fowler at CMU has invented a new word: prosilience: I propose that we build operationally PROSILIENT organizations. If operational resilience, as we like...Bruce Schneier From Schneier on Security | March 2, 2017 at 07:08 AM
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized...Bruce Schneier From Schneier on Security | March 1, 2017 at 07:53 AM
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered: On the technical front, what the app is...Bruce Schneier From Schneier on Security | March 1, 2017 at 07:02 AM
We all should be concerned about the privacy settings in Windows 10. And we should be glad that the EU has the regulatory authority to do something about it....Bruce Schneier From Schneier on Security | February 28, 2017 at 07:25 AM
At a talk last week, the head of US Cyber Command and the NSA Mike Rogers talked about the US buying cyberweapons from arms manufacturers. "In the application of...Bruce Schneier From Schneier on Security | February 27, 2017 at 03:28 PM
This is an excellent survey article on modern propaganda techniques, how they work, and how we might defend ourselves against them. Cory Doctorow summarizes the...Bruce Schneier From Schneier on Security | February 27, 2017 at 07:24 AM
A short SF story in a tweet. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 24, 2017 at 05:24 PM
Last November, I gave a talk at the TEDMED Conference on health and medical data privacy. The talk is online...Bruce Schneier From Schneier on Security | February 24, 2017 at 02:36 PM