From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is pretty horrific:
…a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement...Bruce Schneier From Schneier on Security | July 18, 2024 at 11:33 AM
6.8%, to be precise.
From ZDNet:
However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all...Bruce Schneier From Schneier on Security | July 17, 2024 at 12:03 PM
Some scholars are inflating their reference counts by sneaking them into metadata:
Citations of scientific work abide by a standardized referencing system: Each...Bruce Schneier From Schneier on Security | July 15, 2024 at 01:13 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking on “Reimagining Democracy in the Age of AI” at the Bozeman Library in Bozeman, Montana...Bruce Schneier From Schneier on Security | July 14, 2024 at 12:05 PM
I didn’t know:
In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps...Bruce Schneier From Schneier on Security | July 12, 2024 at 05:01 PM
The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far)...Bruce Schneier From Schneier on Security | July 12, 2024 at 07:04 AM
Not a lot of details:
Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks...Bruce Schneier From Schneier on Security | July 11, 2024 at 11:09 AM
New attack against the RADIUS authentication protocol:
The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge...Bruce Schneier From Schneier on Security | July 10, 2024 at 10:42 AM
A new vampire squid species was discovered in the South China Sea.
Blog moderation policy.Bruce Schneier From Schneier on Security | July 5, 2024 at 05:39 PM
It’s a serious one:
The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE)...Bruce Schneier From Schneier on Security | July 3, 2024 at 11:27 AM
This article about an app that lets people remotely view bars to see if they’re crowded or not is filled with commentary—on both sides—about privacy and openness...Bruce Schneier From Schneier on Security | July 2, 2024 at 07:06 AM
If you’ve been reading my blog, you’ve noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce...Bruce Schneier From Schneier on Security | July 1, 2024 at 03:01 PM
A new paper, “Polynomial Time Cryptanalytic Extraction of Neural Network Models,” by Adi Shamir and others, uses ideas from differential cryptanalysis to extract...Bruce Schneier From Schneier on Security | July 1, 2024 at 07:05 AM
A new squid species—of the Gonatidae family—was discovered. The video shows her holding a brood of very large eggs.
Research paper.Bruce Schneier From Schneier on Security | June 28, 2024 at 05:01 PM
Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act (FISA).Bruce Schneier From Schneier on Security | June 28, 2024 at 07:04 AM
This move has been coming for a long time.
The Biden administration on Thursday said it’s banning the company from selling its products to new US-based customers...Bruce Schneier From Schneier on Security | June 26, 2024 at 07:06 AM
Interesting paper about a German cryptanalysis machine that helped break the US M-209 mechanical ciphering machine.
The paper contains a good description of how...Bruce Schneier From Schneier on Security | June 25, 2024 at 07:02 AM
Interesting summary of various ways to derive the public key from digitally signed files.
Normally, with a signature scheme, you have the public key and want to...Bruce Schneier From Schneier on Security | June 20, 2024 at 07:10 AM
There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments...Bruce Schneier From Schneier on Security | June 19, 2024 at 04:26 PM