From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Watch this video of gentoo penguins fighting over a large squid. This underwater brawl was captured on a video camera taped to the back of the second penguin, revealing...Bruce Schneier From Schneier on Security | December 18, 2015 at 05:11 PM
If you like puzzles, GCHQ has one for you. Just don't let it distract you from fighting the UK legislation giving the GCHQ new surveillance powers....Bruce Schneier From Schneier on Security | December 18, 2015 at 01:29 PM
The Intercept has "a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies."...Bruce Schneier From Schneier on Security | December 17, 2015 at 01:06 PM
This should come as no surprise: users often compromise their own security by making mistakes setting up and using their encryption apps. Paper: "On the Security...Bruce Schneier From Schneier on Security | December 17, 2015 at 07:46 AM
Yesterday, the city of Los Angeles closed all of its schools -- over 1,000 schools -- because of a bomb threat. It was a hoax. LA officials defended the move, with...Bruce Schneier From Schneier on Security | December 16, 2015 at 07:28 AM
Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...Bruce Schneier From Schneier on Security | December 15, 2015 at 01:19 AM
The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....Bruce Schneier From Schneier on Security | December 14, 2015 at 06:46 AM
Neat: While the Dana octopus squid may lack a squid's trademark trailing tentacles, it makes up for them in spectacular lighting equipment, with two of its muscular...Bruce Schneier From Schneier on Security | December 11, 2015 at 05:02 PM
I'll be participating in an end-of-year trends and predictions webinar on Thursday, December 17, at 1:00 PM EST. Join me here. In other news, Resilient has joined...Bruce Schneier From Schneier on Security | December 11, 2015 at 03:56 PM
A Florida woman drove away after an accident, but her car automatically reported it anyway. She was arrested....Bruce Schneier From Schneier on Security | December 11, 2015 at 07:48 AM
Interesting research: "Identifying patterns in informal sources of security information," by Emilee Rader and Rick Wash, Journal of Cybersecurity, 1 Dec 2015. Abstract...Bruce Schneier From Schneier on Security | December 10, 2015 at 07:54 AM
I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...Bruce Schneier From Schneier on Security | December 9, 2015 at 02:48 PM
Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...Bruce Schneier From Schneier on Security | December 8, 2015 at 08:25 AM
Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...Bruce Schneier From Schneier on Security | December 7, 2015 at 06:35 AM
I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...Bruce Schneier From Schneier on Security | December 4, 2015 at 05:22 PM
BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...Bruce Schneier From Schneier on Security | December 4, 2015 at 07:40 AM
Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...Bruce Schneier From Schneier on Security | December 3, 2015 at 03:49 PM
Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...Bruce Schneier From Schneier on Security | December 3, 2015 at 08:55 AM