From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In March, Adi Shamir -- that's the "S" in RSA -- was denied a US visa to attend the RSA Conference. He's Israeli. This month, British citizen Ross Anderson couldn't...Bruce Schneier From Schneier on Security | May 17, 2019 at 07:18 AM
Last month, Kaspersky discovered that Asus's live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six...Bruce Schneier From Schneier on Security | May 16, 2019 at 02:34 PM
Remember the Spectre and Meltdown attacks from last year? They were a new class of attacks against complex CPUs, finding subliminal channels in optimization techniques...Bruce Schneier From Schneier on Security | May 16, 2019 at 10:28 AM
WhatsApp fixed a devastating vulnerability that allowed someone to remotely hack a phone by initiating a WhatsApp voice call. The recipient didn't even have to...Bruce Schneier From Schneier on Security | May 15, 2019 at 03:22 PM
This is a current list of where and when I am scheduled to speak: I'm speaking on "Securing a World of Physically Capable Computers" at Oxford University on Monday...Bruce Schneier From Schneier on Security | May 14, 2019 at 01:15 PM
A weird paper was posted on the Cryptology ePrint Archive (working link is via the Wayback Machine), claiming an attack against the NSA-designed cipher SIMON. You...Bruce Schneier From Schneier on Security | May 14, 2019 at 07:11 AM
Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. The details are fascinating...Bruce Schneier From Schneier on Security | May 13, 2019 at 07:37 AM
Last Wednesday was a Cephalopod Appreciation Society event in Seattle. I missed it. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | May 10, 2019 at 05:18 PM
A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly...Bruce Schneier From Schneier on Security | May 10, 2019 at 07:30 AM
In 2015, the Intercept started publishing "The Drone Papers," based on classified documents leaked by an unknown whistleblower. Today, someone who worked at the...Bruce Schneier From Schneier on Security | May 9, 2019 at 04:17 PM
Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon's ranking...Bruce Schneier From Schneier on Security | May 9, 2019 at 06:58 AM
In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Most people believe it is a front for...Bruce Schneier From Schneier on Security | May 8, 2019 at 12:30 PM
Evil Clippy is a tool for creating malicious Microsoft Office macros: At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers...Bruce Schneier From Schneier on Security | May 8, 2019 at 07:03 AM
This short video explains why computers regularly came with physical locks in the late 1980s and early 1990s. The one thing the video doesn't talk about is RAM...Bruce Schneier From Schneier on Security | May 7, 2019 at 07:22 AM
Israel has acknowledged that its recent airstrikes against Hamas were a real-time response to an ongoing cyberattack. From Twitter: CLEARED FOR RELEASE: We thwarted...Bruce Schneier From Schneier on Security | May 6, 2019 at 05:09 PM
I don't have a lot of good news for you. The truth is there's nothing we can do to protect our data from being stolen by cybercriminals and others. Ten years ago...Bruce Schneier From Schneier on Security | May 6, 2019 at 08:08 AM
Researchers are making space blankets using technology based on squid skin. Honestly, it's hard to tell how much squid is actually involved in this invention. As...Bruce Schneier From Schneier on Security | May 3, 2019 at 05:15 PM
The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices...Bruce Schneier From Schneier on Security | May 3, 2019 at 05:33 AM
Politico has a long article making the case that the lead GDPR regulator, Ireland, has too cozy a relationship with Silicon Valley tech companies to effectively...Bruce Schneier From Schneier on Security | May 2, 2019 at 06:17 AM