From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Review of a squid-related children’s book.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read...Bruce Schneier From Schneier on Security | October 2, 2020 at 12:06 PM
Researchers can detect deep fakes because they don’t convincingly mimic human blood circulation in the face:
In particular, video of a person’s face contains subtle...Bruce Schneier From Schneier on Security | September 30, 2020 at 08:45 PM
Really interesting conversation with someone who negotiates with ransomware gangs:
For now, it seems that paying ransomware, while obviously risky and empowering...Bruce Schneier From Schneier on Security | September 28, 2020 at 03:21 PM
As expected, IoT devices are filled with vulnerabilities:
As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of...Bruce Schneier From Schneier on Security | September 28, 2020 at 03:18 PM
A Dusseldorf woman died when a ransomware attack against a hospital forced her to be taken to a different hospital in another city.
I think this is the first documented...Bruce Schneier From Schneier on Security | September 22, 2020 at 04:25 PM
Mark Jaycox has written a long article on the US Executive Order 12333: “No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order...Bruce Schneier From Schneier on Security | September 22, 2020 at 01:19 PM
The New York Times wrote about a still-unreleased report from Chckpoint and the Miaan Group:
The reports, which were reviewed by The New York Times in advance of...Bruce Schneier From Schneier on Security | September 22, 2020 at 01:19 PM
No real surprises, but we finally have the story.
The story he went on to tell is strikingly straightforward. De Guzman was poor, and internet access was expensive...Bruce Schneier From Schneier on Security | September 21, 2020 at 08:58 PM
I thought the virus doesn’t survive well on food packaging:
Authorities in China’s northeastern Jilin province have found the novel coronavirus on the packaging...Bruce Schneier From Schneier on Security | September 21, 2020 at 08:58 PM
The founder and CEO of the Internet security company NS8 has been arrested and “charged in a Complaint in Manhattan federal court with securities fraud, fraud in...Bruce Schneier From Schneier on Security | September 18, 2020 at 02:22 PM
Amazon drivers — all gig workers who don’t work for the company — are hanging cell phones in trees near Amazon delivery stations, fooling the system into thinking...Bruce Schneier From Schneier on Security | September 17, 2020 at 02:28 PM
SQUID news:
Physicists have developed a small, compact superconducting quantum interference device (SQUID) that can detect magnetic fields. The team l focused on...Bruce Schneier From Schneier on Security | September 17, 2020 at 11:35 AM
Matt Blaze discusses an interesting mystery about a Cuban one-time-pad radio station, and a random number generator error that probably helped arrest a pair of...Bruce Schneier From Schneier on Security | September 15, 2020 at 11:50 AM
There’s a new unpatched Bluetooth vulnerability:
The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is...Bruce Schneier From Schneier on Security | September 15, 2020 at 11:48 AM
St. Louis Magazine answers the important question: “Is there a difference between calamari and squid?” Short answer: no.
As usual, you can also use this squid post...Bruce Schneier From Schneier on Security | September 11, 2020 at 02:24 PM
The Grugq has written an excellent essay on how the Russian cybercriminal gang FIN7 operates. An excerpt:
The secret of FIN7’s success is their operational art...Bruce Schneier From Schneier on Security | September 9, 2020 at 03:03 PM
Interesting privacy analysis of the Ambient Light Sensor API. And a blog post. Especially note the “Lessons Learned” section.Bruce Schneier From Schneier on Security | September 9, 2020 at 02:51 PM
It’s complicated, but it’s basically a man-in-the-middle attack that involves two smartphones. The first phone reads the actual smartcard, and then forwards the...Bruce Schneier From Schneier on Security | September 9, 2020 at 02:50 PM