From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Mark Risher of Google extols the virtues of security keys: I'll say it again for the people in the back: with Security Keys, instead of the *user* needing to verify...Bruce Schneier From Schneier on Security | May 1, 2019 at 07:14 AM
To better understand influence attacks, we proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable...Bruce Schneier From Schneier on Security | April 30, 2019 at 07:59 AM
Someone is stealing millions of dollars worth of Ethereum by guessing users' private keys. Normally this should be impossible, but lots of keys seem to be very...Bruce Schneier From Schneier on Security | April 29, 2019 at 07:39 AM
Pioneer DJ has a new sequencer: the Toraiz SQUID: Sequencer Inspirational Device. The 16-track sequencer is designed around jamming and performance with a host...Bruce Schneier From Schneier on Security | April 26, 2019 at 05:14 PM
Business Weekly in Taiwan interviewed me. (Here's a translation courtesy of Google.) It was a surprisingly intimate interview. I hope the Chinese reads better than...Bruce Schneier From Schneier on Security | April 26, 2019 at 03:20 PM
Cyberattacks don't magically happen; they involve a series of steps. And far from being helpless, defenders can disrupt the attack at any of those steps. This framing...Bruce Schneier From Schneier on Security | April 26, 2019 at 07:09 AM
Nice bit of adversarial machine learning. The image from this news article is most of what you need to know, but here's the research paper....Bruce Schneier From Schneier on Security | April 25, 2019 at 07:31 AM
A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. The vulnerability allows anyone to surreptitiously join any conversation...Bruce Schneier From Schneier on Security | April 24, 2019 at 07:23 AM
From a G7 meeting of interior ministers in Paris this month, an "outcome document": Encourage Internet companies to establish lawful access solutions for their...Bruce Schneier From Schneier on Security | April 23, 2019 at 10:14 AM
This is the best analysis of the software causes of the Boeing 737 MAX disasters that I have read. Technically this is safety and not security; there was no attacker...Bruce Schneier From Schneier on Security | April 22, 2019 at 09:45 AM
There's a new diversity of species. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...Bruce Schneier From Schneier on Security | April 19, 2019 at 05:27 PM
DNS hijacking isn't new, but this seems to be an attack of uprecidented scale: Researchers at Cisco's Talos security division on Wednesday revealed that a hacker...Bruce Schneier From Schneier on Security | April 18, 2019 at 06:13 AM
Presidential candidate John Delaney has announced a plan to create a Department of Cybersecurity. I have long been in favor of a new federal agency to deal with...Bruce Schneier From Schneier on Security | April 17, 2019 at 08:57 AM
FireEye is releasing much more information about the Triton malware that attacks critical infrastructure. It has been discovered in more places. This is also a...Bruce Schneier From Schneier on Security | April 16, 2019 at 07:10 AM
Researchers have found several vulnerabilities in the WPA3 Wi-Fi security protocol: The design flaws we discovered can be divided in two categories. The first category...Bruce Schneier From Schneier on Security | April 15, 2019 at 03:00 PM
Supply chain security is an insurmountably hard problem. The recent focus is on Chinese 5G equipment, but the problem is much broader. This opinion piece looks...Bruce Schneier From Schneier on Security | April 15, 2019 at 07:30 AM
Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | April 12, 2019 at 05:19 PM
In what I am sure is only a first in many similar demonstrations, researchers are able to add or remove cancer signs from CT scans. The results easily fool radiologists...Bruce Schneier From Schneier on Security | April 12, 2019 at 12:13 PM
Flame was discovered in 2012, linked to Stuxnet, and believed to be American in origin. It has recently been linked to more modern malware through new analysis...Bruce Schneier From Schneier on Security | April 12, 2019 at 07:25 AM