From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here...Bruce Schneier From Schneier on Security | November 1, 2016 at 03:10 PM
An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....Bruce Schneier From Schneier on Security | October 31, 2016 at 02:12 PM
Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 28, 2016 at 05:11 PM
Interesting research: "Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP": Abstract: Acoustic emanations of computer keyboards represent a serious privacy...Bruce Schneier From Schneier on Security | October 28, 2016 at 06:24 AM
A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough...Bruce Schneier From Schneier on Security | October 27, 2016 at 03:23 PM
Good long article on the 2015 attack against the US Office of Personnel Management....Bruce Schneier From Schneier on Security | October 26, 2016 at 02:37 PM
It's not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream -- and the...Bruce Schneier From Schneier on Security | October 26, 2016 at 07:38 AM
I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the...Bruce Schneier From Schneier on Security | October 24, 2016 at 03:12 PM
Josephine Wolff examines different Internet governance stakeholders and how they frame security debates. Her conclusion: The tensions that arise around issues of...Bruce Schneier From Schneier on Security | October 24, 2016 at 07:03 AM
Yesterday's DDoS attacks against Dyn are being reported everywhere. I have received a gazillion press requests, but I am traveling in Australia and Asia and have...Bruce Schneier From Schneier on Security | October 22, 2016 at 09:47 AM
Interesting article listing the squid species that can still be ethically eaten. The problem, of course, is that on a restaurant menu it's just labeled "squid."...Bruce Schneier From Schneier on Security | October 21, 2016 at 05:00 PM
Interesting interview: Obama: Traditionally, when we think about security and protecting ourselves, we think in terms of armor or walls. Increasingly, I find myself...Bruce Schneier From Schneier on Security | October 20, 2016 at 07:16 AM
Researchers discover a clever attack that bypasses the address space layout randomization (ALSR) on Intel's CPUs. Here's the paper. It discusses several possible...Bruce Schneier From Schneier on Security | October 19, 2016 at 03:19 PM
Lance Spitzner looks at the safety features of a power saw and tries to apply them to Internet security: By the way, here are some of the key safety features that...Bruce Schneier From Schneier on Security | October 19, 2016 at 07:45 AM
Former NSA attorneys John DeLong and Susan Hennessay have written a fascinating article describing a particular incident of oversight failure inside the NSA. Technically...Bruce Schneier From Schneier on Security | October 18, 2016 at 03:29 PM
This is a harrowing story of a scam artist that convinced a mother that her daughter had been kidnapped. More stories are here. It's unclear if these virtual kidnappers...Bruce Schneier From Schneier on Security | October 17, 2016 at 07:28 AM