From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
"Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client," by Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. Abstract...Bruce Schneier From Schneier on Security | November 12, 2015 at 03:28 PM
This is an interesting story. Someone posts a photograph of herself holding a winning horse-race betting ticket, and someone else uses the data from the photograph...Bruce Schneier From Schneier on Security | November 12, 2015 at 08:01 AM
Jobs are plentiful and salaries are booming. I know from personal experience that demand far exceeds supply....Bruce Schneier From Schneier on Security | November 10, 2015 at 03:17 PM
Margaret McFall-Ngai studies the symbiotic relationship between squid and the bacteria that live inside them. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | November 6, 2015 at 05:30 PM
Last month, the Cato Institute held its Second Annual Cato Surveillance Conference. It was an excellent event, with many interesting talks and panels. But their...Bruce Schneier From Schneier on Security | November 5, 2015 at 07:16 AM
Interesting paper: "Drops for Stuff: An Analysis of Reshipping Mule Scams. From a blog post: A cybercriminal (called operator) recruits unsuspecting citizens with...Bruce Schneier From Schneier on Security | November 4, 2015 at 02:59 PM
I don't know whether to believe this story. Supposedly the startup Zerodium paid someone $1M for an iOS 9.1 and 9.2b hack. Bekrar and Zerodium, as well as its predecessor...Bruce Schneier From Schneier on Security | November 3, 2015 at 03:31 PM
Australia is going to be the first country to have virtual passports. Presumably, the passport data will be in the cloud somewhere, and you'll access it with an...Bruce Schneier From Schneier on Security | November 3, 2015 at 07:20 AM
Last week, CIA director John O. Brennan became the latest victim of what's become a popular way to embarrass and harass people on the Internet. A hacker allegedly...Bruce Schneier From Schneier on Security | November 2, 2015 at 07:47 AM
First ever examples of a baby giant squid have been found. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | October 30, 2015 at 05:08 PM
"China Unable To Recruit Hackers Fast Enough To Keep Up With Vulnerabilities In U.S. Security Systems." It's only funny because it's true....Bruce Schneier From Schneier on Security | October 30, 2015 at 03:35 PM
In 2009, the Australian government released the Protocol for Lightweight Authentication of Identity (PLAID) protocol. It was recently analyzed (original paper is...Bruce Schneier From Schneier on Security | October 30, 2015 at 07:40 AM
This device is clever: it's a three-digit combination lock that prevents a USB drive from being read. It's not going to keep out anyone serious, but is a great...Bruce Schneier From Schneier on Security | October 29, 2015 at 02:38 PM
Researchers have shown that it is both easy and cheap to surveil connected vehicles. The second link talks about various anonymization techniques, none of which...Bruce Schneier From Schneier on Security | October 29, 2015 at 07:33 AM
In August, I wrote about the NSA's plans to move to quantum-resistant algorithms for its own cryptographic needs. Cryptographers Neal Koblitz and Alfred Menezes...Bruce Schneier From Schneier on Security | October 28, 2015 at 03:11 PM