From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is bad in several dimensions. The Los Angeles Department of Water and Power has been accused of deliberately keeping widespread gaps in its cybersecurity a...Bruce Schneier From Schneier on Security | March 11, 2020 at 11:52 AM
Joshua Schulte, the CIA employee standing trial for leaking the Wikileaks Vault 7 CIA hacking tools, maintains his innocence. And during the trial, a lot of shoddy...Bruce Schneier From Schneier on Security | March 10, 2020 at 07:18 AM
Robert Chesney teaches cybersecurity at the University of Texas School of Law. He recently published a fantastic casebook, which is a good source for anyone studying...Bruce Schneier From Schneier on Security | March 9, 2020 at 07:36 AM
Two articles. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | March 6, 2020 at 05:06 PM
One follow-on to the story of Crypto AG being owned by the CIA: this interview with a Washington Post reporter. The whole thing is worth reading or listening to...Bruce Schneier From Schneier on Security | March 6, 2020 at 08:48 AM
The world is racing to contain the new COVID-19 virus that is spreading around the globe with alarming speed. Right now, pandemic disease experts at the World Health...Bruce Schneier From Schneier on Security | March 5, 2020 at 07:10 AM
The BBC is reporting a vulnerability in the Let's Encrypt certificate service: In a notification email to its clients, the organisation said: "We recently discovered...Bruce Schneier From Schneier on Security | March 4, 2020 at 07:46 AM
There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter...Bruce Schneier From Schneier on Security | March 3, 2020 at 07:43 AM
Privacy International has the details: Key facts: Despite Facebook claim, "Download Your Information" doesn't provide users with a list of all advertisers who uploaded...Bruce Schneier From Schneier on Security | March 2, 2020 at 07:28 AM
Cool photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | February 28, 2020 at 05:08 PM
For years, Humble Bundle has been selling great books at a "pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books...Bruce Schneier From Schneier on Security | February 28, 2020 at 02:53 PM
Google presented its system of using deep-learning techniques to identify malicious email attachments: At the RSA security conference in San Francisco on Tuesday...Bruce Schneier From Schneier on Security | February 28, 2020 at 12:57 PM
This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that (1) market realities...Bruce Schneier From Schneier on Security | February 27, 2020 at 07:03 AM
The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of...Bruce Schneier From Schneier on Security | February 26, 2020 at 07:08 AM
This is good news: Whenever you visit a website -- even if it's HTTPS enabled -- the DNS query that converts the web address into an IP address that computers can...Bruce Schneier From Schneier on Security | February 25, 2020 at 10:15 AM
The Times of London is reporting that Russian agents are in Ireland probing transatlantic communications cables. Ireland is the landing point for undersea cables...Bruce Schneier From Schneier on Security | February 24, 2020 at 07:27 AM
It's probably a juvenile: Researchers aboard the New Zealand-based National Institute of Water and Atmospheric Research Ltd (NIWA) research vessel Tangaroa were...Bruce Schneier From Schneier on Security | February 21, 2020 at 05:19 PM
For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe...Bruce Schneier From Schneier on Security | February 21, 2020 at 03:04 PM
Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption...Bruce Schneier From Schneier on Security | February 21, 2020 at 06:54 AM
There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...Bruce Schneier From Schneier on Security | February 20, 2020 at 03:23 PM