From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
NIST has release a draft of Special Publication1800-38A: Migration to Post-Quantum Cryptography: Preparation for Considering the Implementation and Adoption of....Bruce Schneier From Schneier on Security | May 2, 2023 at 10:10 AM
Here’s a research group trying to replicate squid cell transparency in mammalian cells.
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | April 28, 2023 at 05:07 PM
My latest book, A Hacker’s Mind, is filled with stories about the rich and powerful hacking systems, but it was hard to find stories of the hacking by the lessarticle...Bruce Schneier From Schneier on Security | April 28, 2023 at 03:15 PM
Stanford and Georgetown have a new report on the security risks of AI—particularly adversarial machine learning—based on a workshop they held on the topic.
Jimblog...Bruce Schneier From Schneier on Security | April 27, 2023 at 09:38 AM
There’s good reason to fear that A.I. systems like ChatGPT and GPT4 will harm democracy. Public debate may be overwhelmed by industrial quantities of autogenerated...Bruce Schneier From Schneier on Security | April 26, 2023 at 06:51 AM
Following a report on its activities, the Israeli spyware company QuaDream has shut down.
This was QuadDream:
Key Findings
Based on an analysis of samples shared...Bruce Schneier From Schneier on Security | April 25, 2023 at 06:09 AM
In an open letter, seven secure messaging apps—including Signal and WhatsApp—point out that the UK’s Online Safety Bill could destroy end-to-end encryption:
As...Bruce Schneier From Schneier on Security | April 24, 2023 at 06:39 AM
The squid you eat most likely comes from unregulated waters.
As usual, you can also use this squid post to talk about the security stories in the news that I haven...Bruce Schneier From Schneier on Security | April 21, 2023 at 05:04 PM
My latest book, A Hacker’s Mind, has a lot of sports stories. Sports are filled with hacks, as players look for every possible advantage that doesn’t explicitly...Bruce Schneier From Schneier on Security | April 21, 2023 at 02:11 PM
This a good example of a security feature that can sometimes harm security:
Apple introduced the optional recovery key in 2020 to protect users from online hackers...Bruce Schneier From Schneier on Security | April 21, 2023 at 10:19 AM
CitizenLab has identified three zero-click exploits against iOS 15 and 16. These were used by NSO Group’s Pegasus spyware in 2022, and deployed by Mexico against...Bruce Schneier From Schneier on Security | April 20, 2023 at 06:47 AM
EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being negotiated in Vienna.
The draft treaty has the potential to rewrite...Bruce Schneier From Schneier on Security | April 19, 2023 at 06:07 AM
I’m not sure there are good ways to build guardrails to prevent this sort of thing:
There is growing concern regarding the potential misuse of molecular machine...Bruce Schneier From Schneier on Security | April 18, 2023 at 07:19 AM
Motherboard is reporting on AI-generated voices being used for “swatting”:
In fact, Motherboard has found, this synthesized call and another against Hempstead High...Bruce Schneier From Schneier on Security | April 17, 2023 at 07:15 AM
Interesting article on the colossal squid, which is larger than the giant squid.
The article answers a vexing question:
So why do we always hear about the giant...Bruce Schneier From Schneier on Security | April 14, 2023 at 05:14 PM
Here’s a religious hack:
You want to commit suicide, but it’s a mortal sin: your soul goes straight to hell, forever. So what you do is murder someone. That will...Bruce Schneier From Schneier on Security | April 14, 2023 at 03:06 PM
You can beat the game without a computer:
On a perfect [roulette] wheel, the ball would always fall in a random way. But over time, wheels develop flaws, which...Bruce Schneier From Schneier on Security | April 14, 2023 at 07:02 AM
Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.
I wrote about this kind of thing in 2000, in Secrets...Bruce Schneier From Schneier on Security | April 13, 2023 at 07:22 AM
The FBI is warning people against using public phone-charging stations, worrying that the combination power-data port can be used to inject malware onto the devices...Bruce Schneier From Schneier on Security | April 12, 2023 at 07:11 AM
Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic...Bruce Schneier From Schneier on Security | April 11, 2023 at 07:22 AM