From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The EU's GDPR regulation requires companies to report a breach within 72 hours. Alex Stamos, former Facebook CISO now at Stanford University, points out how this...Bruce Schneier From Schneier on Security | October 3, 2018 at 04:24 PM
Interesting article on terahertz millimeter-wave scanners and their uses to detect terrorist bombers. The heart of the device is a block of electronics about the...Bruce Schneier From Schneier on Security | October 3, 2018 at 08:11 AM
Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: "never give out any information about yourself in...Bruce Schneier From Schneier on Security | October 2, 2018 at 04:09 PM
From Kashmir Hill: Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact...Bruce Schneier From Schneier on Security | October 2, 2018 at 06:53 AM
Earlier this month, I wrote about a statement by the Five Eyes countries about encryption and back doors. (Short summary: they like them.) One of the weird things...Bruce Schneier From Schneier on Security | October 1, 2018 at 07:22 AM
This is really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 28, 2018 at 05:11 PM
The major tech companies, scared that states like California might impose actual privacy regulations, have now decided that they can better lobby the federal government...Bruce Schneier From Schneier on Security | September 28, 2018 at 02:19 PM
This one is from NIST: "Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others...Bruce Schneier From Schneier on Security | September 27, 2018 at 01:00 PM
Interesting research: In the team's experiments, one WiFi transmitter and one WiFi receiver are behind walls, outside a room in which a number of people are present...Bruce Schneier From Schneier on Security | September 27, 2018 at 08:43 AM
This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital...Bruce Schneier From Schneier on Security | September 25, 2018 at 07:50 AM
If someone has physical access to your shut-down computer, they can probably break the hard-drive's encryption. This is a "cold boot" attack, and one we thought...Bruce Schneier From Schneier on Security | September 24, 2018 at 07:52 AM
On James Island. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 21, 2018 at 05:14 PM
Lots of people are e-mailing me about this new result on the distribution of prime numbers. While interesting, it has nothing to do with cryptography. Cryptographers...Bruce Schneier From Schneier on Security | September 21, 2018 at 03:14 PM
NIST has released a new study concluding that the AES encryption standard has resulted in a $250 billion world-wide economic benefit over the past twenty years....Bruce Schneier From Schneier on Security | September 21, 2018 at 07:37 AM
Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This particular...Bruce Schneier From Schneier on Security | September 20, 2018 at 07:45 AM
Citizen Lab has published a new report about the Pegasus spyware. From a ZDNet article: The malware, known as Pegasus (or Trident), was created by Israeli cyber...Bruce Schneier From Schneier on Security | September 19, 2018 at 06:19 AM
A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of...Bruce Schneier From Schneier on Security | September 17, 2018 at 07:12 AM
Lessons learned. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 14, 2018 at 05:13 PM
It's impossible to know all the details, but my latest book seems to be selling well. Initial reviews have been really positive: Boing Boing, Financial Times, Harris...Bruce Schneier From Schneier on Security | September 14, 2018 at 03:14 PM