From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This device is clever: it's a three-digit combination lock that prevents a USB drive from being read. It's not going to keep out anyone serious, but is a great...Bruce Schneier From Schneier on Security | October 29, 2015 at 02:38 PM
Researchers have shown that it is both easy and cheap to surveil connected vehicles. The second link talks about various anonymization techniques, none of which...Bruce Schneier From Schneier on Security | October 29, 2015 at 07:33 AM
In August, I wrote about the NSA's plans to move to quantum-resistant algorithms for its own cryptographic needs. Cryptographers Neal Koblitz and Alfred Menezes...Bruce Schneier From Schneier on Security | October 28, 2015 at 03:11 PM
If the director of the CIA can't keep his e-mail secure, what hope do the rest of us have -- for our e-mail or any of our digital information? None, and that's...Bruce Schneier From Schneier on Security | October 28, 2015 at 07:24 AM
In Data and Goliath, I talk about the need for transparency, oversight, and accountability as the mechanism to allow surveillance when it is necessary, while preserving...Bruce Schneier From Schneier on Security | October 27, 2015 at 10:52 AM
Ravens have been shown to identify and remember cheaters among their unkindness....Bruce Schneier From Schneier on Security | October 26, 2015 at 03:32 PM
Microsoft's President Brad Smith has a blog post discussing what to do now that the US-EU safe-harbor agreement has collapsed. He outlines four steps: First, we...Bruce Schneier From Schneier on Security | October 26, 2015 at 09:40 AM
This paper describes what is almost certainly the most sophisticated chip-and-pin credit card fraud to date. News article. BoingBoing post....Bruce Schneier From Schneier on Security | October 23, 2015 at 07:58 AM
This is impressive: "An attacker sends an infected packet to a fitness tracker nearby at bluetooth distance then the rest of the attack occurs by itself, without...Bruce Schneier From Schneier on Security | October 22, 2015 at 02:20 PM
Both the FBI and local law enforcement are trying to get the genetic data stored at companies like 23andMe. No surprise, really. As NYU law professor Erin Murphy...Bruce Schneier From Schneier on Security | October 22, 2015 at 07:40 AM
A lot has been written about the security vulnerability resulting from outdated and unpatched Android software. The basic problem is that while Google regularly...Bruce Schneier From Schneier on Security | October 21, 2015 at 07:22 AM
If you call the proper phone extension, you have complete control over the public address system at a Target store....Bruce Schneier From Schneier on Security | October 19, 2015 at 10:49 AM
"Terrifying" squid photos. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 16, 2015 at 05:20 PM
Citizen Lab continues to do excellent work exposing the world's cyber-weapons arms manufacturers. Its latest report attempts to track users of Gamma International's...Bruce Schneier From Schneier on Security | October 16, 2015 at 03:33 PM
The Internet is abuzz with this blog post and paper, speculating that the NSA is breaking the Diffie-Hellman key-exchange protocol in the wild through massive precomputation...Bruce Schneier From Schneier on Security | October 16, 2015 at 07:19 AM
The Obama Administration is not pursuing a law that would force computer and communications manufacturers to add backdoors to their products for law enforcement...Bruce Schneier From Schneier on Security | October 14, 2015 at 10:39 AM