From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop...Bruce Schneier From Schneier on Security | January 7, 2020 at 07:03 AM
Here's a physical-world example of why master keys are a bad idea. It's a video of two postal thieves using a master key to open apartment building mailboxes. Changing...Bruce Schneier From Schneier on Security | January 6, 2020 at 07:20 AM
Fantastic video: Scientists had used a specialized camera system developed by Widder called the Medusa, which uses red light undetectable to deep sea creatures...Bruce Schneier From Schneier on Security | January 3, 2020 at 05:25 PM
A malicious Chrome extension surreptitiously steals Ethereum keys and passwords: According to Denley, the extension is dangerous to users in two ways. First, any...Bruce Schneier From Schneier on Security | January 3, 2020 at 07:09 AM
No one knows who they belong to. (Well, of course someone knows. And my guess is that it's likely that we will know soon.)...Bruce Schneier From Schneier on Security | January 2, 2020 at 12:02 PM
Lance Vick suggesting that students hack their schools' surveillance systems. "This is an ethical minefield that I feel students would be well within their rights...Bruce Schneier From Schneier on Security | December 30, 2019 at 11:20 AM
Euprymna brenneri was discovered in the waters of Okinawa. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | December 27, 2019 at 05:13 PM
Interesting story of how a Chinese state-sponsored hacking group is bypassing the RSA SecurID two-factor authentication system. How they did it remains unclear;...Bruce Schneier From Schneier on Security | December 26, 2019 at 07:19 AM
The smartphone messaging app ToTok is actually an Emirati spying tool: But the service, ToTok, is actually a spying tool, according to American officials familiar...Bruce Schneier From Schneier on Security | December 24, 2019 at 02:13 PM
Yet another squid acronym. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | December 20, 2019 at 05:06 PM
DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five...Bruce Schneier From Schneier on Security | December 19, 2019 at 07:31 AM
This isn't a first, but I think it will be the first conviction: The GIF set off a highly unusual court battle that is expected to equip those in similar circumstances...Bruce Schneier From Schneier on Security | December 18, 2019 at 06:34 AM
New details: At the CyberwarCon conference in Arlington, Virginia, on Thursday, Microsoft security researcher Ned Moran plans to present new findings from the company's...Bruce Schneier From Schneier on Security | December 17, 2019 at 07:05 AM
Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many...Bruce Schneier From Schneier on Security | December 16, 2019 at 07:00 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at SecIT by Heise in Hannover, Germany on March 26, 2020. The list is maintained...Bruce Schneier From Schneier on Security | December 14, 2019 at 02:00 PM
Interesting stuff. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | December 13, 2019 at 05:02 PM
EFF has published a comprehensible and very readable "deep dive" into the technologies of corporate surveillance, both on the Internet and off. Well worth reading...Bruce Schneier From Schneier on Security | December 13, 2019 at 07:01 AM
Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly...Bruce Schneier From Schneier on Security | December 12, 2019 at 07:11 AM
Privacy International has published a detailed, technical examination of how data is extracted from smartphones....Bruce Schneier From Schneier on Security | December 11, 2019 at 07:19 AM
There's a serous debate on reforming Section 230 of the Communications Decency Act. I am in the process of figuring out what I believe, and this is more a place...Bruce Schneier From Schneier on Security | December 10, 2019 at 07:16 AM