From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From DefCon: At the Defcon hacker conference today, security researcher Truman Kain debuted what he calls the Surveillance Detection Scout. The DIY computer fits...Bruce Schneier From Schneier on Security | August 22, 2019 at 06:21 AM
There's no indication that this vulnerability was ever used in the wild, but the code it was discovered in -- Microsoft's Text Services Framework -- has been around...Bruce Schneier From Schneier on Security | August 21, 2019 at 07:46 AM
Excellent op-ed on the growing trend to tie humanitarian aid to surveillance. Despite the best intentions, the decision to deploy technology like biometrics is...Bruce Schneier From Schneier on Security | August 20, 2019 at 07:45 AM
Influence operations are elusive to define. The Rand Corp.'s definition is as good as any: "the collection of tactical information about an adversary as well as...Bruce Schneier From Schneier on Security | August 19, 2019 at 07:14 AM
Interesting research: The squid robot is powered primarily by compressed air, which it stores in a cylinder in its nose (do squids have noses?). The fins and arms...Bruce Schneier From Schneier on Security | August 16, 2019 at 05:05 PM
Boeing left its software unprotected, and researchers have analyzed it for vulnerabilities: At the Black Hat security conference today in Las Vegas, Santamarta,...Bruce Schneier From Schneier on Security | August 16, 2019 at 07:12 AM
Apple's FaceID has a liveness detection feature, which prevents someone from unlocking a victim's phone by putting it in front of his face while he's sleeping....Bruce Schneier From Schneier on Security | August 15, 2019 at 07:19 AM
Several high-security electronic locks are vulnerable to side-channel attacks involving power monitoring....Bruce Schneier From Schneier on Security | August 14, 2019 at 01:36 PM
Last month, Attorney General William Barr gave a major speech on encryption policywhat is commonly known as "going dark." Speaking at Fordham University in New...Bruce Schneier From Schneier on Security | August 14, 2019 at 07:18 AM
A researcher abused the GDPR to get information on his fiancee: It is one of the first tests of its kind to exploit the EU's General Data Protection Regulation...Bruce Schneier From Schneier on Security | August 13, 2019 at 07:17 AM
Interesting analysis: "Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?" by Susan Landau and Asaf Lubin...Bruce Schneier From Schneier on Security | August 12, 2019 at 07:14 AM
Great video of the Sinuous Asperoteuthis Mangoldae Squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | August 9, 2019 at 05:12 PM
Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. Security vulnerabilities in the update...Bruce Schneier From Schneier on Security | August 8, 2019 at 12:11 PM
This wasn't a small operation: A Pakistani man bribed AT&T call-center employees to install malware and unauthorized hardware as part of a scheme to fraudulently...Bruce Schneier From Schneier on Security | August 8, 2019 at 07:22 AM
I know there's a lot of politics associated with this story, but concentrate on the cybersecurity aspect for a moment. The cell phones of a thousand Brazilians,...Bruce Schneier From Schneier on Security | August 7, 2019 at 11:48 AM
Interesting article on people using banks of smartphones to commit ad fraud for profit. No one knows how prevalent ad fraud is on the Internet. I believe it is...Bruce Schneier From Schneier on Security | August 6, 2019 at 07:20 AM
Siena Anstis, Ronald J. Deibert, John Scott-Railton of Citizen Lab published an editorial calling for regulating the international trade in commercial surveillance...Bruce Schneier From Schneier on Security | August 5, 2019 at 10:14 AM
Really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | August 2, 2019 at 05:20 PM
Yesterday, I blogged about a Facebook plan to backdoor WhatsApp by adding client-side scanning and filtering. It seems that I was wrong, and there are no such plans...Bruce Schneier From Schneier on Security | August 2, 2019 at 03:18 PM
There's a really interesting video of protesters in Hong Kong using some sort of laser to disable security cameras. I know nothing more about the technologies involved...Bruce Schneier From Schneier on Security | August 2, 2019 at 12:53 PM