From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Intercept has an extraordinary story: the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of...Bruce Schneier From Schneier on Security | February 20, 2015 at 08:52 AM
Earlier this month, Mark Burnett released a database of ten million usernames and passwords. He collected this data from already-public dumps from hackers who had...Bruce Schneier From Schneier on Security | February 19, 2015 at 02:35 PM
Interesting article on the submarine arms race between remaining hidden and detection. It seems that it is much more expensive for a submarine to hide than it is...Bruce Schneier From Schneier on Security | February 19, 2015 at 07:15 AM
I'm not sure what to make of this, or even what it means. The IRS has a standard called IDES: International Data Exchange Service: "The International Data Exchange...Bruce Schneier From Schneier on Security | February 18, 2015 at 07:42 AM
This week, Kaspersky Labs published detailed information on what it calls the Equation Group -- almost certainly the NSA -- and its abilities to embed spyware deep...Bruce Schneier From Schneier on Security | February 17, 2015 at 01:58 PM
Today my company, Co3 Systems, is changing its name to Resilient Systems. The new name better reflects who we are and what we do. Plus, the old name was kind of...Bruce Schneier From Schneier on Security | February 17, 2015 at 08:00 AM
This is what happens when a PR person gets hold of information he really doesn't understand. "Mustang" is the 16th most common password on the Internet according...Bruce Schneier From Schneier on Security | February 16, 2015 at 09:56 AM
After a year of talking about it, my new book is finally published. This is the copy from the inside front flap: You are under surveillance right now. Your cell...Bruce Schneier From Schneier on Security | February 15, 2015 at 07:41 AM
Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 13, 2015 at 05:58 PM
Interesting National Science Foundation award: In the proposed "CryptoClub" afterschool program, middle-grade students will explore cryptography while applying...Bruce Schneier From Schneier on Security | February 13, 2015 at 02:40 PM
Earlier this week, we learned that Samsung televisions are eavesdropping on their owners. If you have one of their Internet-connected smart TVs, you can turn on...Bruce Schneier From Schneier on Security | February 13, 2015 at 08:51 AM
DJI is programming no-fly zones into its drone software. Here's how it'll work. The update will add a list of GPS coordinates to the drone's computer that tells...Bruce Schneier From Schneier on Security | February 12, 2015 at 01:22 PM
Long New York Times article based on "former American and Indian officials and classified documents disclosed by Edward J. Snowden" outlining the intelligence failures...Bruce Schneier From Schneier on Security | February 12, 2015 at 07:57 AM
Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Speigel recently....Bruce Schneier From Schneier on Security | February 11, 2015 at 07:33 AM
In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama...Bruce Schneier From Schneier on Security | February 9, 2015 at 05:20 PM
The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | February 6, 2015 at 06:58 PM
In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases,...Bruce Schneier From Schneier on Security | February 6, 2015 at 10:41 AM
Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because...Bruce Schneier From Schneier on Security | February 5, 2015 at 08:50 PM
Interesting paper: "There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams," by Marie Vasek and Tyler Moore. Abstract...Bruce Schneier From Schneier on Security | February 4, 2015 at 08:48 AM
In an interview this week, President Obama said that terrorism does not pose an existential threat: What I do insist on is that we maintain a proper perspective...Bruce Schneier From Schneier on Security | February 3, 2015 at 07:15 AM