From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting taxonomy of machine-learning failures (pdf) that encompasses both mistakes and attacks, or -- in their words -- intentional and unintentional failure...Bruce Schneier From Schneier on Security | December 9, 2019 at 06:56 AM
Watchmen supporting material. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | December 6, 2019 at 05:20 PM
Andy Ellis, the CSO of Akamai, gave a great talk about the psychology of risk at the Business of Software conference this year. I've written about this before....Bruce Schneier From Schneier on Security | December 6, 2019 at 07:55 AM
Interesting story of a flawed computer voting machine and a paper ballot available for recount. All ended well, but only because of that paper backup. Vote totals...Bruce Schneier From Schneier on Security | December 5, 2019 at 07:06 AM
Carolyn McCarthy gave an excellent TEDx talk about becoming a tech policy activist. It's a powerful call for public-interest technologists....Bruce Schneier From Schneier on Security | December 4, 2019 at 07:04 AM
This just in: We are pleased to announce the factorization of RSA-240, from RSA's challenge list, and the computation of a discrete logarithm of the same size (795...Bruce Schneier From Schneier on Security | December 3, 2019 at 03:12 PM
The New Yorker has published the long and interesting story of the cybersecurity firm Tiversa. Watching "60 Minutes," Boback saw a remarkable new business angle...Bruce Schneier From Schneier on Security | December 3, 2019 at 07:19 AM
New South Wales is implementing a camera system that automatically detects when a driver is using a mobile phone....Bruce Schneier From Schneier on Security | December 2, 2019 at 06:56 AM
The Sea Hunting Autonomous Reconnaissance Drone (SHARD) swims like a squid and can explode on command. As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | November 29, 2019 at 05:13 PM
Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented...Bruce Schneier From Schneier on Security | November 29, 2019 at 06:43 AM
The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems...Bruce Schneier From Schneier on Security | November 27, 2019 at 04:34 PM
"Squid Pro Quo" T-shirt. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | November 22, 2019 at 05:19 PM
The NSA has released a security advisory warning of the dangers of TLS inspection: Transport Layer Security Inspection (TLSI), also known as TLS break and inspect...Bruce Schneier From Schneier on Security | November 22, 2019 at 07:16 AM
Long article on the manipulation of GPS in Shanghai. It seems not to be some Chinese military program, but ships who are stealing sand. The Shanghai "crop circles...Bruce Schneier From Schneier on Security | November 21, 2019 at 07:26 AM
Iran has gone pretty much entirely offline in the wake of nationwide protests. This is the best article detailing what's going on; this is also good. AccessNow...Bruce Schneier From Schneier on Security | November 20, 2019 at 07:52 AM
Researchers have discovered and revealed 146 vulnerabilities in various incarnations of Android smartphone firmware. The vulnerabilities were found by scanning...Bruce Schneier From Schneier on Security | November 18, 2019 at 07:33 AM
Neat video, and an impressive-looking squid. I can't figure out how long it is. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | November 15, 2019 at 05:13 PM
Really interesting research: TPM-FAIL: TPM meets Timing and Lattice Attacks, by Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, and Nadia Heninger. Abstract: Trusted...Bruce Schneier From Schneier on Security | November 15, 2019 at 10:36 AM
This is a current list of where and when I am scheduled to speak: I'm speaking on "Securing a World of Physically Capable Computers" at the Indian Institute of...Bruce Schneier From Schneier on Security | November 14, 2019 at 02:17 PM
Technologists and policymakers largely inhabit two separate worlds. It's an old problem, one that the British scientist CP Snow identified in a 1959 essay entitled...Bruce Schneier From Schneier on Security | November 14, 2019 at 08:04 AM