From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A group of pirates -- the real kind -- determined which cargo to steal by hacking into a shipping company's database. Here's the report....Bruce Schneier From Schneier on Security | March 8, 2016 at 02:29 PM
Interesting article on detecting cheaters in professional bridge using big-data analysis. Basically, a big part of the game is the communication of information...Bruce Schneier From Schneier on Security | March 8, 2016 at 07:07 AM
New paper: "The Economics of Privacy, by Alessandro Acquisti, Curtis R. Taylor, and Liad Wagman: Abstract: This article summarizes and draws connections among diverse...Bruce Schneier From Schneier on Security | March 7, 2016 at 04:59 PM
A purported giant squid that washed up on the shore in Norfolk, England, is actually a minke whale. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | March 4, 2016 at 05:51 PM
This is the first time I've heard of this clever hack. Bicycle thieves saw through a bicycle rack and then tape it back together, so unsuspecting people chain their...Bruce Schneier From Schneier on Security | March 4, 2016 at 01:02 PM
Thefts of personal information aren't unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of the...Bruce Schneier From Schneier on Security | March 4, 2016 at 06:32 AM
Earlier this week, we learned of yet another attack against SSL/TLS where an attacker can force people to use insecure algorithms. It's called DROWN. Here's a good...Bruce Schneier From Schneier on Security | March 3, 2016 at 03:09 PM
Many wireless keyboards have a security vulnerability that allow someone to hack the computer using the keyboard-computer link. (Technical details here.) An attacker...Bruce Schneier From Schneier on Security | March 3, 2016 at 07:29 AM
This interesting study tries to build a mathematical model for the continued secrecy of conspiracies, and tries to predict how long before they will be revealed...Bruce Schneier From Schneier on Security | March 2, 2016 at 01:39 PM
It's not just governments. Companies like Dstillery are doing this too: "We watched each of the caucus locations for each party and we collected mobile device ID's...Bruce Schneier From Schneier on Security | March 2, 2016 at 07:34 AM
As part of an ongoing series of classified NSA target list and raw intercepts, WikiLeaks published details of the NSA's spying on UN Secretary General Ban Ki-Moon...Bruce Schneier From Schneier on Security | March 1, 2016 at 01:55 PM
I have written two posts on the case, and at the bottom of those essays are lots of links to other essays written by other people. Here are more links. If you read...Bruce Schneier From Schneier on Security | March 1, 2016 at 07:47 AM
Today, IBM announced its intention to purchase my company, Resilient Systems. (Yes, the rumors were basically true.) I think this is a great development for Resilient...Bruce Schneier From Schneier on Security | February 29, 2016 at 12:08 PM
Research paper: Gavin J.D. Smith, "Surveillance, Data and Embodiment: On the Work of Being Watched," Body and Society, January 2016. Abstract: Today's bodies are...Bruce Schneier From Schneier on Security | February 29, 2016 at 07:17 AM
Engineers have invented a wave energy converter that works in the same way that squid propel themselves through the water. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | February 26, 2016 at 05:49 PM
New Research: Rebecca Lipman, "Online Privacy and the Invisible Market for Our Data." The paper argues that notice and consent doesn't work, and suggests how is...Bruce Schneier From Schneier on Security | February 26, 2016 at 01:22 PM
Law Professor Karen Levy writes about the rise of surveillance in our most intimate activities -- love, sex, romance -- and how it affects those activities. This...Bruce Schneier From Schneier on Security | February 26, 2016 at 08:33 AM
In the conversation about zero-day vulnerabilities and whether "good" governments should disclose or hoard vulnerabilities, one of the critical variables is independent...Bruce Schneier From Schneier on Security | February 25, 2016 at 02:14 PM
Encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your cell phone conversations from eavesdroppers...Bruce Schneier From Schneier on Security | February 25, 2016 at 07:40 AM