From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Slate magazine was able to cleverly read the Ghislaine Maxwell deposition and reverse-engineer many of the redacted names.
We’ve long known that redacting is hard...Bruce Schneier From Schneier on Security | October 26, 2020 at 11:37 PM
Squid geopolitics.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines...Bruce Schneier From Schneier on Security | October 26, 2020 at 04:03 PM
Gizmodo is reporting that Harris Corp. is no longer selling Stingray IMSI-catchers (and, presumably, its follow-on models Hailstorm and Crossbow) to local governments...Bruce Schneier From Schneier on Security | October 25, 2020 at 09:57 PM
There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it...Bruce Schneier From Schneier on Security | October 23, 2020 at 09:47 AM
The NSA released an advisory listing the top twenty-five known vulnerabilities currently being exploited by Chinese nation-state attackers.
This advisory provides...Bruce Schneier From Schneier on Security | October 21, 2020 at 10:21 AM
Interview with Mike Vecchione, Curator of Cephalopoda — now that’s a job title — at the Smithsonian Museum of National History.
One reason they’re so interesting...Bruce Schneier From Schneier on Security | October 16, 2020 at 04:30 PM
The Hewlett Foundation just announced its top five ideas in its Cybersecurity Visuals Challenge. The problem Hewlett is trying to solve is the dearth of good visuals...Bruce Schneier From Schneier on Security | October 16, 2020 at 04:29 PM
Researchers are tricking autopilots by inserting split-second images into roadside billboards.
Researchers at Israel’s Ben Gurion University of the Negev … previously...Bruce Schneier From Schneier on Security | October 16, 2020 at 04:29 PM
This is a current list of where and when I am scheduled to speak:
I’ll be speaking at Cyber Week Online, October 19-21, 2020.
I’ll be speaking at the IEEE Symposium...Bruce Schneier From Schneier on Security | October 14, 2020 at 04:49 AM
Earlier this month, we learned that someone is disrupting the TrickBot botnet network.
Over the past 10 days, someone has been launching a series of coordinated...Bruce Schneier From Schneier on Security | October 13, 2020 at 03:15 PM
The Workshop on Economics of Information Security will be online this year. Register here.Bruce Schneier From Schneier on Security | October 13, 2020 at 03:00 PM
One of the things we learned from the Snowden documents is that the NSA conducts “about” searches. That is, searches based on activities and not identifiers. A...Bruce Schneier From Schneier on Security | October 12, 2020 at 11:25 AM
Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. So far, they have received $289K.
One of the worst...Bruce Schneier From Schneier on Security | October 9, 2020 at 05:01 PM
Pretty astronomical photo.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting...Bruce Schneier From Schneier on Security | October 8, 2020 at 04:07 PM
Genetic research finds the Humboldt squid is vulnerable to overfishing.
As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | October 8, 2020 at 04:05 PM
The Chinese have been illegally squid fishing near the Galapagos Islands.
As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | October 8, 2020 at 04:04 PM
Previously I have written about the Swedish-owned Swiss-based cryptographic hardware company: Crypto AG. It was a CIA-owned Cold War operation for decades. Today...Bruce Schneier From Schneier on Security | October 5, 2020 at 12:51 PM
Interesting usability study: “More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication“:
Abstract: Risk-based Authentication...Bruce Schneier From Schneier on Security | October 5, 2020 at 12:47 PM
Note: This isn’t my usual essay topic. Still, I want to put it on my blog.
Six months into the pandemic with no end in sight, many of us have been feeling a sense...Bruce Schneier From Schneier on Security | October 2, 2020 at 02:39 PM