From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Apple is rolling out an iOS security usability feature called Security code AutoFill. The basic idea is that the OS scans incoming SMS messages for security codes...Bruce Schneier From Schneier on Security | June 20, 2018 at 07:51 AM
Jack Goldsmith and Stuart Russell just published an interesting paper, making the case that free and democratic nations are at a structural disadvantage in nation...Bruce Schneier From Schneier on Security | June 19, 2018 at 07:54 AM
Tapplock sells an "unbreakable" Internet-connected lock that you can open with your fingerprint. It turns out that: The lock broadcasts its Bluetooth MAC address...Bruce Schneier From Schneier on Security | June 18, 2018 at 07:19 AM
It's Cephalopod Week! "Three hearts, eight arms, can't lose." As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | June 15, 2018 at 05:12 PM
For many years, I have said that complexity is the worst enemy of security. At CyCon earlier this month, Thomas Dullien gave an excellent talk on the subject with...Bruce Schneier From Schneier on Security | June 14, 2018 at 07:28 AM
Internet censors have a new strategy in their bid to block applications and websites: pressuring the large cloud providers that host them. These providers have...Bruce Schneier From Schneier on Security | June 13, 2018 at 07:55 AM
iOS 12, the next release of Apple's iPhone operating system, may include features to prevent someone from unlocking your phone without your permission: The feature...Bruce Schneier From Schneier on Security | June 12, 2018 at 07:23 AM
On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security,...Bruce Schneier From Schneier on Security | June 11, 2018 at 07:19 AM
Interesting fossils. Note that a poster is available. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | June 8, 2018 at 05:04 PM
When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate...Bruce Schneier From Schneier on Security | June 8, 2018 at 07:48 AM
In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for...Bruce Schneier From Schneier on Security | June 7, 2018 at 06:56 AM
We all know that it happens: when we see a security warning too often -- and without effect -- we start tuning it out. A new paper uses fMRI, eye tracking, and...Bruce Schneier From Schneier on Security | June 6, 2018 at 07:21 AM
Ross Anderson has a new paper on cryptocurrency exchanges. From his blog: Bitcoin Redux explains what's going wrong in the world of cryptocurrencies. The bitcoin...Bruce Schneier From Schneier on Security | June 5, 2018 at 07:32 AM
Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird...Bruce Schneier From Schneier on Security | June 4, 2018 at 07:33 AM
Maybe not DNA, but biological somethings. "Cause of Cambrian explosion -- Terrestrial or Cosmic?": Abstract: We review the salient evidence consistent with or predicted...Bruce Schneier From Schneier on Security | June 1, 2018 at 05:24 PM
Playing a sound over the speakers can cause computers to crash and possibly even physically damage the hard drive. Academic paper....Bruce Schneier From Schneier on Security | June 1, 2018 at 12:14 PM
Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of Bordeaux...Bruce Schneier From Schneier on Security | May 31, 2018 at 02:23 PM
Fake kidnapping fraud: "Most commonly we have unsolicited calls to potential victims in Australia, purporting to represent the people in authority in China and...Bruce Schneier From Schneier on Security | May 29, 2018 at 10:31 AM
It's not very good, but it has a squid in it. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 25, 2018 at 05:18 PM