From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On today's Internet, too much power is concentrated in too few hands. In the early days of the Internet, individuals were empowered. Now governments and corporations...Bruce Schneier From Schneier on Security | October 14, 2016 at 07:20 AM
Richard Thieme gave a talk on the psychological impact of doing classified intelligence work. Summary here...Bruce Schneier From Schneier on Security | October 12, 2016 at 07:43 AM
You can edit anyone's information you want: The question, boiled down, was haunting: Want to see how easy it would be to get into someone's voter registration and...Bruce Schneier From Schneier on Security | October 11, 2016 at 03:04 PM
Interesting research in Nature. The article is behind a paywall, but here are five summaries of the research....Bruce Schneier From Schneier on Security | October 11, 2016 at 06:51 AM
Brian Krebs is a popular reporter on the cybersecurity beat. He regularly exposes cybercriminals and their tactics, and consequently is regularly a target of their...Bruce Schneier From Schneier on Security | October 10, 2016 at 11:26 AM
All cephalopods are colorblind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 7, 2016 at 05:37 PM
The NSA has another contractor who stole classified documents. It's a weird story: "But more than a month later, the authorities cannot say with certainty whether...Bruce Schneier From Schneier on Security | October 7, 2016 at 07:07 AM
News here and here. Other companies have been quick to deny that they did the same thing, but I generally don't believe those carefully worded statements about...Bruce Schneier From Schneier on Security | October 6, 2016 at 02:58 PM
This paper wins "best abstract" award: "Quantum Tokens for Digital Signatures," by Shalev Ben David and Or Sattath: Abstract: The fisherman caught a quantum fish...Bruce Schneier From Schneier on Security | October 6, 2016 at 08:03 AM
Forbes is reporting that the Israeli cyberweapons arms manufacturer Wintego has a man-in-the-middle exploit against WhatsApp. It's a weird story. I'm not sure how...Bruce Schneier From Schneier on Security | October 4, 2016 at 02:47 PM
This article on US/China cooperation and competition in cyberspace is an interesting lens through which to examine security policy....Bruce Schneier From Schneier on Security | October 4, 2016 at 07:40 AM
Interesting survey of the cybersecurity culture in Norway. 96% of all Norwegian are online, more than 90% embrace new technology, and 6 of 10 feel capable of judging...Bruce Schneier From Schneier on Security | October 3, 2016 at 07:23 AM
Every few years, a researcher replicates a security study by littering USB sticks around an organization's grounds and waiting to see how many people pick them...Bruce Schneier From Schneier on Security | October 3, 2016 at 07:12 AM
The Gonatus squid eats its own kind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 30, 2016 at 05:14 PM
Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data...Bruce Schneier From Schneier on Security | September 30, 2016 at 07:16 AM
Interesting research from Sasha Romanosky at RAND: Abstract: In 2013, the US President signed an executive order designed to help secure the nation's critical infrastructure...Bruce Schneier From Schneier on Security | September 29, 2016 at 07:51 AM
A new malware tries to detect if it's running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they're...Bruce Schneier From Schneier on Security | September 28, 2016 at 07:34 AM