From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a fun steganographic application: hiding a message in a fingerprint image. Can't see any real use for it, but that's okay....Bruce Schneier From Schneier on Security | November 12, 2018 at 07:17 AM
Pretty good video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | November 9, 2018 at 05:07 PM
This is a new thing: The Pentagon has suddenly started uploading malware samples from APTs and other nation-state sources to the website VirusTotal, which is essentially...Bruce Schneier From Schneier on Security | November 9, 2018 at 02:52 PM
Interesting paper: "Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier," by Christine Borgman: Abstract: As universities recognize the...Bruce Schneier From Schneier on Security | November 9, 2018 at 07:04 AM
This is really just to point out that computer security is really hard: Almost as soon as Apple released iOS 12.1 on Tuesday, a Spanish security researcher discovered...Bruce Schneier From Schneier on Security | November 8, 2018 at 07:35 AM
Consumer Reports is starting to evaluate the security of IoT devices. As part of that, it's reviewing wireless home-security cameras. It found significant security...Bruce Schneier From Schneier on Security | November 7, 2018 at 07:39 AM
Interesting research: "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)": Abstract: We have analyzed the hardware full-disk...Bruce Schneier From Schneier on Security | November 6, 2018 at 07:51 AM
Troy Hunt has a good essay about why passwords are here to stay, despite all their security problems: This is why passwords aren't going anywhere in the foreseeable...Bruce Schneier From Schneier on Security | November 5, 2018 at 11:24 AM
This research paper concludes that we'll be eating more squid in the future. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | November 2, 2018 at 05:08 PM
Interesting policy paper by Third Way: "To Catch a Hacker: Toward a comprehensive strategy to identify, pursue, and punish malicious cyber actors": In this paper...Bruce Schneier From Schneier on Security | November 2, 2018 at 07:01 AM
This is not surprising: This year, I bought two more machines to see if security had improved. To my dismay, I discovered that the newer model machines -- those...Bruce Schneier From Schneier on Security | November 1, 2018 at 07:18 AM
The conventional story is that Iran targeted Saudi Arabia with Triton in 2017. New research from FireEye indicates that it might have been Russia. I don't know....Bruce Schneier From Schneier on Security | October 31, 2018 at 01:44 PM
Earlier this week, the New York Times reported that the Russians and the Chinese were eavesdropping on President Donald Trump's personal cell phone and using the...Bruce Schneier From Schneier on Security | October 30, 2018 at 07:38 AM
I've blogged twice about the Bloomberg story that China bugged Supermicro networking equipment destined to the US. We still don't know if the story is true, although...Bruce Schneier From Schneier on Security | October 29, 2018 at 04:19 PM
This seems bad: The F25 software was found to contain a capture replay vulnerability -- basically an attacker would be able to eavesdrop on radio transmissions...Bruce Schneier From Schneier on Security | October 29, 2018 at 07:18 AM
Two New Yorkers have been charged with importing squid from Peru and then reselling it as octopus. Yet another problem that a blockchain-enabled supply-chain system...Bruce Schneier From Schneier on Security | October 26, 2018 at 05:02 PM
This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if...Bruce Schneier From Schneier on Security | October 26, 2018 at 10:01 AM
BuzzFeed is reporting on a scheme where fraudsters buy legitimate Android apps, track users' behavior in order to mimic it in a way that evades bot detectors, and...Bruce Schneier From Schneier on Security | October 25, 2018 at 07:49 AM
This is a long -- and somewhat technical -- paper by Chris C. Demchak and Yuval Shavitt about China's repeated hacking of the Internet Border Gateway Protocol (BGP)...Bruce Schneier From Schneier on Security | October 24, 2018 at 07:00 AM