From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...Bruce Schneier From Schneier on Security | July 17, 2014 at 07:17 AM
Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....Bruce Schneier From Schneier on Security | July 16, 2014 at 07:02 AM
Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...Bruce Schneier From Schneier on Security | July 15, 2014 at 03:30 PM
Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...Bruce Schneier From Schneier on Security | July 15, 2014 at 07:49 AM
The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...Bruce Schneier From Schneier on Security | July 14, 2014 at 03:01 PM
This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...Bruce Schneier From Schneier on Security | July 14, 2014 at 07:16 AM
Neat video shot from a remote-operated vehicle. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | July 11, 2014 at 05:58 PM
Funny, and the inspiration for this week's headlines. (Note that the image shows Password Safe on the screen.) And marginally related, here's an odd essay about...Bruce Schneier From Schneier on Security | July 11, 2014 at 04:53 PM
Okay, it's a parody: The Russian Federation is more complex. At a political level there's a lot of grandstanding. Operationally though, we share intelligence with...Bruce Schneier From Schneier on Security | July 11, 2014 at 07:53 AM
Researchers are refining the techniques of surreptitiously videoing people as they type in their passwords. Other hackers have shown it's possible to perform automated...Bruce Schneier From Schneier on Security | July 10, 2014 at 03:56 PM
LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...Bruce Schneier From Schneier on Security | July 10, 2014 at 07:36 AM
The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...Bruce Schneier From Schneier on Security | July 9, 2014 at 01:55 PM
Man-in-the-middle attack against a Brazilian payment system: Brazil has an extremely active and talented cybercrime underground, and increasingly Brazilian organized...Bruce Schneier From Schneier on Security | July 9, 2014 at 08:30 AM
Pickpocket tricks explained by neuroscience. So while sleight of hand helps, it's as much about capturing all of somebody's attention with other movements. Street...Bruce Schneier From Schneier on Security | July 8, 2014 at 07:53 AM
Last week, the German government arrested someone and charged him with spying for the US. Buried in one of the stories was a little bit of tradecraft. The US game...Bruce Schneier From Schneier on Security | July 7, 2014 at 02:56 PM
The latest story from the Snowden documents analyzes a large cache of intercepted conversations -- actual operational data -- and concludes that 90% of the individuals...Bruce Schneier From Schneier on Security | July 7, 2014 at 06:58 AM
Cute design. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 4, 2014 at 05:13 PM
I don't care about the case, but look at this: "Among the details police have released is that Harris and his wife, Leanna, told them they conducted Internet searches...Bruce Schneier From Schneier on Security | July 4, 2014 at 07:55 AM
Jake Appelbaum et. al, are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites....Bruce Schneier From Schneier on Security | July 3, 2014 at 12:57 PM
Goldman Sachs is going to court to demand that Google retroactively delete an e-mail it accidentally sent. The breach occurred on June 23 and included "highly confidential...Bruce Schneier From Schneier on Security | July 3, 2014 at 08:51 AM