From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Yale University Press has published a facsimile of the Voynich Manuscript. The manuscript is also available online....Bruce Schneier From Schneier on Security | December 5, 2016 at 03:20 PM
Researchers have found that they can guess various credit-card-number security details by spreading their guesses around multiple websites so as not to trigger...Bruce Schneier From Schneier on Security | December 5, 2016 at 07:25 AM
A 50-foot squid has not been found in New Zealand. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | December 2, 2016 at 07:18 PM
Excellent essay pointing out that election security is a national security issue, and that we need to perform random ballot audits on every future election: The...Bruce Schneier From Schneier on Security | December 2, 2016 at 07:39 AM
Citizen Lab has analyzed how censorship works in the Chinese chat app WeChat: Key Findings: Keyword filtering on WeChat is only enabled for users with accounts...Bruce Schneier From Schneier on Security | December 1, 2016 at 10:29 AM
Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity....Bruce Schneier From Schneier on Security | November 30, 2016 at 10:33 AM
You can rent a 400,000-computer Murai botnet and DDoS anyone you like. BoingBoing post. Slashdot thread....Bruce Schneier From Schneier on Security | November 29, 2016 at 07:01 AM
It's really bad. The ticket machines were hacked. Over the next couple of years, I believe we are going to see the downside of our headlong rush to put everything...Bruce Schneier From Schneier on Security | November 28, 2016 at 06:36 PM
Here's a nice picture of one of the few known poisonous squids. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | November 25, 2016 at 05:30 PM
Was the 2016 presidential election hacked? It's hard to tell. There were no obvious hacks on Election Day, but new reports have raised the question of whether voting...Bruce Schneier From Schneier on Security | November 25, 2016 at 11:00 AM
Susan Landau has an excellent essay on why it's more important than ever to have backdoor-free encryption on our computer and communications systems. Protecting...Bruce Schneier From Schneier on Security | November 23, 2016 at 03:01 PM
Surprising no one who has been following this sort of thing, headphones can be used as microphones....Bruce Schneier From Schneier on Security | November 23, 2016 at 07:56 AM
Vice Motherboard has an interesting article about governments using social-media platforms for propaganda and surveillance, and the companies that are supporting...Bruce Schneier From Schneier on Security | November 22, 2016 at 03:29 PM
According to a Harris poll, 39% of Americans would give up sex for a year for perfect computer security: According to an online survey among over 2,000 U.S. adults...Bruce Schneier From Schneier on Security | November 21, 2016 at 07:04 AM
Squid catch is down, so fisherman are trying to sell more processed product. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | November 18, 2016 at 05:10 PM
This is pretty amazing: International customers and users of disposable or prepaid phones are the people most affected by the software. But the scope is unclear...Bruce Schneier From Schneier on Security | November 18, 2016 at 03:22 PM
This is impressive research: "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals": Abstract: In this study, we present WindTalker...Bruce Schneier From Schneier on Security | November 18, 2016 at 07:40 AM
PoisonTap is an impressive hacking tool that can compromise computers via the USB port, even when they are password protected. What's interesting is the chain of...Bruce Schneier From Schneier on Security | November 17, 2016 at 09:22 AM
Yet another way to collect personal data on people without their knowledge or consent: "Lifestyle chemistries from phones for individual profiling": Abstract: Imagine...Bruce Schneier From Schneier on Security | November 16, 2016 at 08:40 AM