From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Modern cars have alarm systems that automatically connect to a remote call center. This makes cars harder to steal, since tripping the alarm causes a quick response...Bruce Schneier From Schneier on Security | August 21, 2018 at 06:58 AM
James Mickens gave an excellent keynote at the USENIX Security Conference last week, talking about the social aspects of security -- racism, sexism, etc. -- and...Bruce Schneier From Schneier on Security | August 20, 2018 at 09:07 AM
The Hotaruika Museum is a museum devoted to firefly squid in Toyama, Japan. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | August 17, 2018 at 07:06 PM
Interesting research on web tracking: "Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies: Abstract: Nowadays, cookies are...Bruce Schneier From Schneier on Security | August 17, 2018 at 06:26 AM
Another speculative-execution attack against Intel's SGX. At a high level, SGX is a new feature in modern Intel CPUs which allows computers to protect users' data...Bruce Schneier From Schneier on Security | August 16, 2018 at 12:43 PM
Suprising no one, the security of police bodycams is terrible. Mitchell even realized that because he can remotely access device storage on models like the Fire...Bruce Schneier From Schneier on Security | August 15, 2018 at 07:04 AM
Google is tracking you, even if you turn off tracking: Google says that will prevent the company from remembering where you've been. Google's support page on the...Bruce Schneier From Schneier on Security | August 14, 2018 at 07:22 AM
Fascinating research de-anonymizing code -- from either source code or compiled code: Rachel Greenstadt, an associate professor of computer science at Drexel University...Bruce Schneier From Schneier on Security | August 13, 2018 at 05:02 PM
Interesting video of a robot grabber that's delicate enough to capture squid (and even jellyfish) in the ocean. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | August 10, 2018 at 05:16 PM
Last week, CNN reported that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes -- 60...Bruce Schneier From Schneier on Security | August 10, 2018 at 07:10 AM
Really interesting article: A trained eye (or even a not-so-trained one) can discern when something phishy is going on with a domain or subdomain name. There are...Bruce Schneier From Schneier on Security | August 9, 2018 at 07:17 AM
BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace...Bruce Schneier From Schneier on Security | August 8, 2018 at 10:37 AM
Interesting research: "Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions": Abstract: Accurately modeling human decision-making in security...Bruce Schneier From Schneier on Security | August 7, 2018 at 07:40 AM
Long and interesting story -- now two decades old -- of massive fraud perpetrated against the McDonald's Monopoly sweepstakes. The central fraudster was the person...Bruce Schneier From Schneier on Security | August 6, 2018 at 06:57 AM
The calamari squid grabs prey three feet away with its fast tentacles. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | August 3, 2018 at 05:15 PM
Humble Bundle sells groups of e-books at ridiculously low prices, DRM free. This month, the bundles are all Wiley titles, including three of my books: Applied Cryptography...Bruce Schneier From Schneier on Security | August 3, 2018 at 03:10 PM
Interesting commentary: The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack...Bruce Schneier From Schneier on Security | August 3, 2018 at 07:21 AM
Evidence that stolen credit cards are being used to purchase items in games like Clash of Clans, which are then resold for cash....Bruce Schneier From Schneier on Security | August 2, 2018 at 07:14 AM
The UK's GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. Ubiquitous...Bruce Schneier From Schneier on Security | August 1, 2018 at 03:07 PM