From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Writing a magazine column is always an exercise in time travel. I'm writing these words in early December. You're reading them in February. This means anything...Bruce Schneier From Schneier on Security | March 24, 2016 at 07:37 AM
The FBI just added two members of the Syrian Electronic Army to its cyber most-wanted list. I had no idea that the FBI had a cyber most-wanted list....Bruce Schneier From Schneier on Security | March 23, 2016 at 02:03 PM
This was newly released under FOIA at my request: Victor C. Williams, Jr., Donn B. Parker, and Charles C. Wood, "Impacts of Federal Policy Options for Nonmilitary...Bruce Schneier From Schneier on Security | March 23, 2016 at 07:20 AM
Interesting analysis from The Grugq: Bottom Line Up Front Intelligence agencies must cooperate more rapidly and proactively to counter ISIS' rapid and haphazard...Bruce Schneier From Schneier on Security | March 22, 2016 at 07:37 AM
Matthew Green and team found and reported a significant iMessage encryption flaw last year. Green suspected there might be a flaw in iMessage last year after he...Bruce Schneier From Schneier on Security | March 21, 2016 at 02:45 PM
The Brennan Center has released a report on EO 12333, the executive order that regulates the NSA's overseas surveillance. Much of what the NSA does here is secret...Bruce Schneier From Schneier on Security | March 21, 2016 at 07:53 AM
Recommended recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 18, 2016 at 05:08 PM
A quote from Data and Goliath is the answer to a Wall Street Journal acrostic. It's not the same as being a New York Times crossword puzzle answer, but it's close...Bruce Schneier From Schneier on Security | March 18, 2016 at 03:39 PM
ZDNet has an article on US government pressure on software companies to hand over copies of their source code. There's no details because no one is talking on the...Bruce Schneier From Schneier on Security | March 18, 2016 at 12:27 PM
NIST has published a draft of their new standard for encryption use: "NIST Special Publication 800-175B, Guideline for Using Cryptographic Standards in the Federal...Bruce Schneier From Schneier on Security | March 17, 2016 at 10:54 AM
The FBI's reply to Apple is more of a character assassination attempt than a legal argument. It's as if it only cares about public opinion at this point. Although...Bruce Schneier From Schneier on Security | March 16, 2016 at 07:12 AM
The New York Times is reporting that WhatsApp, and its parent company Facebook, may be headed to court over encrypted chat data that the FBI can't decrypt. This...Bruce Schneier From Schneier on Security | March 15, 2016 at 07:17 AM
Interesting research: "Third-party punishment as a costly signal of trustworthiness, by Jillian J. Jordan, Moshe Hoffman, Paul Bloom,and David G. Rand, Nature:...Bruce Schneier From Schneier on Security | March 14, 2016 at 01:59 PM
This research shows the power of cell phone metadata. From an article by the author: Yemen has experienced an array of violent incidents and political turmoil in...Bruce Schneier From Schneier on Security | March 13, 2016 at 07:32 AM
Really great Tumblr feed. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 11, 2016 at 05:21 PM
Looks like tens of thousands of ISIS documents have been leaked. Where did they come from? We don't know: Documents listing the names of Islamic State fighters...Bruce Schneier From Schneier on Security | March 11, 2016 at 07:17 AM
A Citizen Lab research study of Chinese attack and espionage tactics against Tibetan networks and users. This report describes the latest iteration in a long-running...Bruce Schneier From Schneier on Security | March 10, 2016 at 03:16 PM
New credit card skimmers are hidden inside the card readers, making them impossible to spot....Bruce Schneier From Schneier on Security | March 10, 2016 at 09:26 AM