From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds -- which implies an insider. Our Gotnews.com investigation...Bruce Schneier From Schneier on Security | December 31, 2014 at 08:56 AM
I haven't seen much press mention about the leaked CIA documents that have appeared on Wikileaks this month. There are three: The CIA review of high-value target...Bruce Schneier From Schneier on Security | December 29, 2014 at 07:46 AM
Spiegel published a long article today on the NSA's analysis capabilities against encrypted systems, with a lot of new documents from the Snowden archive. I'm not...Bruce Schneier From Schneier on Security | December 28, 2014 at 06:32 PM
"St. George, the Dragon, and the Squid: A Preservation Mumming," by the American Folklife Center. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | December 26, 2014 at 05:32 PM
On Christmas eve the NSA relesed a bunch of audit reports on illegal spying using EO 12333 from 2001 to 2013. Bloomberg article. The heavily-redacted reports include...Bruce Schneier From Schneier on Security | December 26, 2014 at 07:43 AM
He sees you when you're sleeping. He knows when you're awake. He's everywhere. And that's the whole point of the Elf on the Shelf, the bright-eyed, Kewpie-esque...Bruce Schneier From Schneier on Security | December 25, 2014 at 07:21 AM
I am deeply skeptical of the FBI's announcement on Friday that North Korea was behind last month's Sony hack. The agency's evidence is tenuous, and I have a hard...Bruce Schneier From Schneier on Security | December 24, 2014 at 07:56 AM
Interesting article on the subconscious visual tricks used to manipulate juries and affect verdicts. In December 2012 the Washington Supreme Court threw out Glasmann's...Bruce Schneier From Schneier on Security | December 23, 2014 at 03:19 PM
North Korea has been knocked off the Internet by a distributed denial-of-service (DDoS) attack. Maybe the US did it, and maybe not. This whole incident is a perfect...Bruce Schneier From Schneier on Security | December 23, 2014 at 11:52 AM
Interesting article talks about the 2008 cyberattack against a Turkish oil pipeline: For western intelligence agencies, the blowout was a watershed event. Hackers...Bruce Schneier From Schneier on Security | December 23, 2014 at 09:38 AM
First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is...Bruce Schneier From Schneier on Security | December 22, 2014 at 07:51 AM
Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | December 19, 2014 at 05:48 PM
Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...Bruce Schneier From Schneier on Security | December 19, 2014 at 01:46 PM
There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into...Bruce Schneier From Schneier on Security | December 19, 2014 at 07:41 AM
Citizen Lab has a new report on a probable ISIS-launched cyberattack: This report describes a malware attack with circumstantial links to the Islamic State in Iraq...Bruce Schneier From Schneier on Security | December 18, 2014 at 11:07 AM
"The next time you call for assistance because the Internet service in your home is not working, the 'technician' who comes to your door may actually be an undercover...Bruce Schneier From Schneier on Security | December 18, 2014 at 07:57 AM
Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....Bruce Schneier From Schneier on Security | December 17, 2014 at 07:44 AM
In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...Bruce Schneier From Schneier on Security | December 16, 2014 at 12:35 PM
There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt...Bruce Schneier From Schneier on Security | December 15, 2014 at 07:57 AM