From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting paper: "How weaponizing disinformation can bring down a city's power grid": Abstract: Social media has made it possible to manipulate the masses via...Bruce Schneier From Schneier on Security | August 18, 2020 at 11:03 AM
Interesting story of a vaccine for the Emotet malware: Through trial and error and thanks to subsequent Emotet updates that refined how the new persistence mechanism...Bruce Schneier From Schneier on Security | August 18, 2020 at 07:03 AM
A group of researchers set up a telephony honeypot and tracked robocall behavior: NCSU researchers said they ran 66,606 telephone lines between March 2019 and January...Bruce Schneier From Schneier on Security | August 17, 2020 at 07:22 AM
Scientists have edited the genome of the Doryteuthis pealeii squid with CRISPR. A first. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | August 14, 2020 at 05:05 PM
This is a current list of where and when I am scheduled to speak: I'm giving a keynote address at the Cybersecurity and Data Privacy Law virtual conference on September...Bruce Schneier From Schneier on Security | August 14, 2020 at 01:15 PM
The NSA and FBI have jointly disclosed Drovorub, a Russian malware suite that targets Linux. Detailed advisory. Fact sheet. News articles. Reddit thread....Bruce Schneier From Schneier on Security | August 14, 2020 at 09:59 AM
Interesting paper on recent hack-and-leak operations attributed to the UAE: Abstract: Four hack-and-leak operations in U.S. politics between 2016 and 2019, publicly...Bruce Schneier From Schneier on Security | August 13, 2020 at 10:28 AM
Mike Stay broke an old zipfile encryption algorithm to recover $300,000 in bitcoin. DefCon talk here....Bruce Schneier From Schneier on Security | August 12, 2020 at 07:08 AM
The Wall Street Journal has an article about a company called Anomaly Six LLC that has an SDK that's used by "more than 500 mobile applications." Through that SDK...Bruce Schneier From Schneier on Security | August 11, 2020 at 07:00 AM
Yet another Internet-connected door lock is insecure: Sold by retailers including Amazon, Walmart, and Home Depot, U-Tec's $139.99 UltraLoq is marketed as a "secure...Bruce Schneier From Schneier on Security | August 10, 2020 at 07:23 AM
There's a new SQUID: A new device that relies on flowing clouds of ultracold atoms promises potential tests of the intersection between the weirdness of the quantum...Bruce Schneier From Schneier on Security | August 7, 2020 at 05:08 PM
The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely...Bruce Schneier From Schneier on Security | August 6, 2020 at 01:15 PM
The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic....Bruce Schneier From Schneier on Security | August 4, 2020 at 07:02 AM
Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first...Bruce Schneier From Schneier on Security | August 3, 2020 at 12:54 PM
A 17-year-old Florida boy was arrested and charged with last week's Twitter hack. News articles. Boing Boing post. Florida state attorney press release. This is...Bruce Schneier From Schneier on Security | July 31, 2020 at 05:03 PM
Researchers are synthesizing squid proteins to create a face mask that better survives cleaning. (And you thought there was no connection between squid and COVID...Bruce Schneier From Schneier on Security | July 31, 2020 at 05:00 PM
Notice the copy of Data and Goliath just behind the head of Maine Senator Angus King. This demonstrates the importance of a vibrant color and a large font....Bruce Schneier From Schneier on Security | July 31, 2020 at 03:04 PM
Fireeye is reporting that a hacking group called Ghostwriter broke into the content management systems of Eastern European news sites to plant fake stories. From...Bruce Schneier From Schneier on Security | July 30, 2020 at 03:56 PM
The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors...Bruce Schneier From Schneier on Security | July 28, 2020 at 07:40 AM
In Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image...Bruce Schneier From Schneier on Security | July 27, 2020 at 10:46 AM