From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second...Bruce Schneier From Schneier on Security | June 26, 2015 at 01:12 PM
On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable...Bruce Schneier From Schneier on Security | June 26, 2015 at 07:59 AM
Wikileaks has published some NSA SIGINT documents describing intercepted French government communications. This seems not be from the Snowden documents. It could...Bruce Schneier From Schneier on Security | June 25, 2015 at 01:51 PM
I think this is the first case of one professional sports team hacking another. No idea if it was an official operation, or a couple of employees doing it on their...Bruce Schneier From Schneier on Security | June 25, 2015 at 07:14 AM
In May, Admiral James A. Winnefeld, Jr., vice-chairman of the Joint Chiefs of Staff, gave an address at the Joint Service Academies Cyber Security Summit at West...Bruce Schneier From Schneier on Security | June 24, 2015 at 08:42 AM
Former NSA Director Michael recently mocked the NSA reforms in the recently passed USA Freedom Act: If somebody would come up to me and say, "Look, Hayden, here's...Bruce Schneier From Schneier on Security | June 23, 2015 at 02:39 PM
Encryption protects our data. It protects our data when it's sitting on our computers and in data centers, and it protects it when it's being transmitted around...Bruce Schneier From Schneier on Security | June 23, 2015 at 07:02 AM
As we're all gearing up to fight the Second Crypto War over governments' demands to be able to back-door any cryptographic system, it pays for us to remember the...Bruce Schneier From Schneier on Security | June 22, 2015 at 02:35 PM
Last weekend, the Sunday Times published a front-page story (full text here), citing anonymous British sources claiming that both China and Russia have copies of...Bruce Schneier From Schneier on Security | June 22, 2015 at 07:13 AM
Nice. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 19, 2015 at 05:03 PM
Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general....Bruce Schneier From Schneier on Security | June 18, 2015 at 07:29 AM
When you connect hospital drug pumps to the Internet, they're hackable -- only surprising people who aren't paying attention. Rios says when he first told Hospira...Bruce Schneier From Schneier on Security | June 17, 2015 at 03:02 PM
New report: "The Tradeoff Fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation." New Annenberg survey results indicate...Bruce Schneier From Schneier on Security | June 17, 2015 at 07:44 AM
Peter Swire, law professor and one of the members of the President's review group on the NSA, writes about intelligence reform and the USA FREEDOM Act....Bruce Schneier From Schneier on Security | June 16, 2015 at 07:59 AM
Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. I still use Windows -- yes, I know, don't even start...Bruce Schneier From Schneier on Security | June 15, 2015 at 08:17 AM
On April 1, I announced the Eighth Movie-Plot Threat Contest: I want a movie-plot threat that shows the evils of encryption. (For those who don't know, a movie-plot...Bruce Schneier From Schneier on Security | June 13, 2015 at 01:11 PM
How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | June 12, 2015 at 05:41 PM
It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...Bruce Schneier From Schneier on Security | June 12, 2015 at 02:38 PM
The Washington Post has a good two part story on the history of insecurity of the Internet....Bruce Schneier From Schneier on Security | June 12, 2015 at 12:45 PM
Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...Bruce Schneier From Schneier on Security | June 12, 2015 at 07:18 AM