From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
MIT researchers have built a system that fools natural-language processing systems by swapping words with synonyms: The software, developed by a team at MIT, looks...Bruce Schneier From Schneier on Security | April 28, 2020 at 11:38 AM
Instacart is taking legal action against bots that automatically place orders: Before it closed, to use Cartdash users first selected what items they want from...Bruce Schneier From Schneier on Security | April 27, 2020 at 07:13 AM
This is neat: Deep in the Pacific Ocean, six-foot-long Humboldt squid are known for being aggressive, cannibalistic and, according to new research, good communicators...Bruce Schneier From Schneier on Security | April 24, 2020 at 05:15 PM
OneZero is tracking thirty countries around the world who are implementing surveillance programs in the wake of COVID-19: The most common form of surveillance implemented...Bruce Schneier From Schneier on Security | April 24, 2020 at 07:02 AM
The New York Times is reporting on state-sponsored disinformation campaigns coming out of China: Since that wave of panic, United States intelligence agencies have...Bruce Schneier From Schneier on Security | April 23, 2020 at 01:01 PM
Last year, ZecOps discovered two iPhone zero-day exploits. They will be patched in the next iOS release: Avraham declined to disclose many details about who the...Bruce Schneier From Schneier on Security | April 22, 2020 at 10:12 AM
This one is from the Netherlands. It seems to be clever cryptanalysis rather than a backdoor. The Dutch intelligence service has been able to read encrypted communications...Bruce Schneier From Schneier on Security | April 21, 2020 at 07:22 AM
Microsoft is training a machine-learning system to find software bugs: At Microsoft, 47,000 developers generate nearly 30 thousand bugs a month. These items get...Bruce Schneier From Schneier on Security | April 20, 2020 at 07:22 AM
How to use squid as bait. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | April 17, 2020 at 05:10 PM
It has produced several reports outlining what's wrong and what needs to be fixed. It's not fixing them: GAO looked at three DoD-designed initiatives to see whether...Bruce Schneier From Schneier on Security | April 17, 2020 at 11:35 AM
This one isn't even related to contact tracing: On March 17, 2020, the federal government relaxed a number of telehealth-related regulatory requirements due to...Bruce Schneier From Schneier on Security | April 16, 2020 at 11:34 AM
This is a current list of where and when I am scheduled to speak: I'm being interviewed on "Hacking in the Public Interest" as part of the Black Hat Webcast Series...Bruce Schneier From Schneier on Security | April 14, 2020 at 02:28 PM
Originally, ransomware didn't involve any data theft. Malware would encrypt the data on your computer, and demand a ransom for the encryption key. Now ransomware...Bruce Schneier From Schneier on Security | April 14, 2020 at 08:48 AM
Google and Apple have announced a joint project to create a privacy-preserving COVID-19 contact tracing app. (Details, such as we have them, are here.) It's similar...Bruce Schneier From Schneier on Security | April 13, 2020 at 07:48 AM
The squid drawings of Yuuki Tokuda are simply incredible. I tried to figure out how to buy one of them, but everything is in Japanese. As usual, you can also use...Bruce Schneier From Schneier on Security | April 10, 2020 at 05:04 PM
Attack matrix for Kubernetes, using the MITRE ATT&CK framework. A good first step towards understand the security of this suddenly popular and very complex container...Bruce Schneier From Schneier on Security | April 10, 2020 at 07:24 AM
A few months ago, Brian Krebs told the story of the domain corp.com, and how it is basically a security nightmare: At issue is a problem known as "namespace collision...Bruce Schneier From Schneier on Security | April 9, 2020 at 07:45 AM
RSA-250 has been factored. This computation was performed with the Number Field Sieve algorithm, using the open-source CADO-NFS software. The total computation...Bruce Schneier From Schneier on Security | April 8, 2020 at 07:37 AM
Three weeks ago (could it possibly be that long already?), I wrote about the increased risks of working remotely during the COVID-19 pandemic. One, employees are...Bruce Schneier From Schneier on Security | April 7, 2020 at 11:00 AM
Microsoft is reporting that an Emotat malware infection shut down a network by causing computers to overheat and then crash. The Emotet payload was delivered and...Bruce Schneier From Schneier on Security | April 6, 2020 at 12:26 PM