From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Here are two articles about how effectively the Islamic State of Iraq and Syria (ISIS) -- the militant group that has just taken over half of Iraq -- is using social...Bruce Schneier From Schneier on Security | June 17, 2014 at 11:22 AM
Good essay on the current state of cyberinsurance. So where does that leave the growing cyber insurance industry as it tries to figure out what losses it should...Bruce Schneier From Schneier on Security | June 16, 2014 at 02:56 PM
Here's a way to plant false evidence -- call records, locations, etc -- on your smart phone. I have no idea how good this will be. Presumably it will be an arms...Bruce Schneier From Schneier on Security | June 16, 2014 at 08:56 AM
This is not good news. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 13, 2014 at 05:59 PM
On April 1, I announced the Seventh Mostly Annual Movie-Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous...Bruce Schneier From Schneier on Security | June 13, 2014 at 07:12 AM
So far they're resisting. Evernote and Deezer are also suffering attacks. I haven't seen anything linking the three different victims, and the other two have not...Bruce Schneier From Schneier on Security | June 11, 2014 at 08:31 AM
We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from...Bruce Schneier From Schneier on Security | June 10, 2014 at 09:54 AM
I'm at SHB 2014: the Seventh Annual Interdisciplinary Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various...Bruce Schneier From Schneier on Security | June 9, 2014 at 05:53 AM
Rhymes with Orange. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 6, 2014 at 05:39 PM
Last June, the Guardian published a story about GCHQ tapping fiber-optic Internet cables around the globe, part of a program codenamed TEMPURA. One of the facts...Bruce Schneier From Schneier on Security | June 5, 2014 at 05:58 PM
On Monday I had the honor of presenting Edward Snowden with a "Champion of Freedom" award at the EPIC dinner. Snowden couldn't be there in person -- his father...Bruce Schneier From Schneier on Security | June 4, 2014 at 04:41 PM
The announcement on April 7 was alarming. A new Internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece...Bruce Schneier From Schneier on Security | June 4, 2014 at 07:46 AM
Chinese hacking of American computer networks is old news. For years we've known about their attacks against U.S. government and corporate targets. We've seen detailed...Bruce Schneier From Schneier on Security | June 2, 2014 at 07:37 AM
Here are pictures of squid-shaped pancakes. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 30, 2014 at 05:51 PM
SEC Consult has published an advisory warning people not to use a government eavesdropping product called Recording eXpress, sold by the Israeli company Nice Systems...Bruce Schneier From Schneier on Security | May 29, 2014 at 03:52 PM
I have no idea what's going on with TrueCrypt. Good summary of story is a ArsTechnica, and SlashDot, Hacker News, and Reddit all have long comment threads. See...Bruce Schneier From Schneier on Security | May 29, 2014 at 09:11 AM