From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
We have leak from yet another cyberweapons arms manufacturer: the Italian company RCS Labs. Vice Motherboard reports on a surveillance video demo: The video shows...Bruce Schneier From Schneier on Security | September 9, 2016 at 03:18 PM
Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company's...Bruce Schneier From Schneier on Security | September 9, 2016 at 10:12 AM
Ever since Ian Kristi, Apple's Head of Security Engineering and Architecture, presented the company's key backup technology at Black Hat 2016, people have been...Bruce Schneier From Schneier on Security | September 8, 2016 at 09:00 AM
For former head of French SIGINT gave a talk (removed from YouTube where he talked about a lot of things he probably shouldn't have. If anyone has 1) a transcript...Bruce Schneier From Schneier on Security | September 7, 2016 at 06:57 AM
Yet another leaked catalog of Internet attack services, this one specializing in disinformation: But Aglaya had much more to offer, according to its brochure. For...Bruce Schneier From Schneier on Security | September 6, 2016 at 03:27 PM
The Intercept has published a 120-page catalog of spy gear from the British defense company Cobham. This is equipment available to police forces. The catalog was...Bruce Schneier From Schneier on Security | September 6, 2016 at 07:31 AM
Easy recipe. You can get the red pepper flakes and red pepper paste at most grocery stores. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | September 4, 2016 at 04:26 AM
I was reading this 2014 McAfee report on the economic impact of cybercrime, and came across this interesting quote on how security is a tax on the Internet economy...Bruce Schneier From Schneier on Security | September 1, 2016 at 10:49 AM
We're starting to see some information on the Israeli cyber-weapons arms manufacturer that sold the iPhone zero-day exploit to the United Arab Emirates so they...Bruce Schneier From Schneier on Security | August 31, 2016 at 09:16 AM
Another paper on using Wi-Fi for surveillance. This one is on identifying people by their body shape. "FreeSense:Indoor Human Identification with WiFi Signals":...Bruce Schneier From Schneier on Security | August 30, 2016 at 01:57 PM
This is interesting research: "Keystroke Recognition Using WiFi Signals." Basically, the user's hand positions as they type distorts the Wi-Fi signal in predictable...Bruce Schneier From Schneier on Security | August 30, 2016 at 07:04 AM
Last week, Apple issued a critical security patch for the iPhone: iOS 9.3.5. The incredible story is that this patch is the result of investigative work by Citizen...Bruce Schneier From Schneier on Security | August 29, 2016 at 02:21 PM
Apple received a patent earlier this year on collecting biometric information of an unauthorized device user. The obvious application is taking a copy of the fingerprint...Bruce Schneier From Schneier on Security | August 29, 2016 at 07:27 AM
Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast...Bruce Schneier From Schneier on Security | August 26, 2016 at 05:30 PM
We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity...Bruce Schneier From Schneier on Security | August 26, 2016 at 03:19 PM
The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information...Bruce Schneier From Schneier on Security | August 26, 2016 at 06:56 AM
Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers...Bruce Schneier From Schneier on Security | August 25, 2016 at 12:12 PM
In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile...Bruce Schneier From Schneier on Security | August 24, 2016 at 10:30 AM
fMRI experiments show that we are more likely to ignore security warnings when they interrupt other tasks. A new study from BYU, in collaboration with Google Chrome...Bruce Schneier From Schneier on Security | August 22, 2016 at 08:03 AM