From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting paper "A first look at browser-based cryptojacking": Abstract: In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies...Bruce Schneier From Schneier on Security | March 21, 2018 at 07:27 AM
Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper...Bruce Schneier From Schneier on Security | March 19, 2018 at 07:27 AM
A new species of pygmy squid was discovered in Western Australia. It's pretty cute. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | March 16, 2018 at 12:10 PM
Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the...Bruce Schneier From Schneier on Security | March 15, 2018 at 07:16 AM
One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and...Bruce Schneier From Schneier on Security | March 14, 2018 at 07:24 AM
I don't know what to make of this story: The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted...Bruce Schneier From Schneier on Security | March 13, 2018 at 07:31 AM
Seems like everyone is writing about encryption and backdoors this season. "Policy Approaches to the Encryption Debate," R Street Policy Study #133, by Charles...Bruce Schneier From Schneier on Security | March 12, 2018 at 07:27 AM
Here's an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | March 9, 2018 at 05:22 PM
Responding to the lack of diversity at the RSA Conference, a group of security experts have announced a competing one-day conference: OUR Security Advocates, or...Bruce Schneier From Schneier on Security | March 9, 2018 at 07:24 AM
Interesting history of the US Army Security Agency in the early years of Cold War Germany....Bruce Schneier From Schneier on Security | March 8, 2018 at 07:29 AM
This is worrisome: DDoS vandals have long intensified their attacks by sending a small number of specially designed data packets to publicly available services....Bruce Schneier From Schneier on Security | March 7, 2018 at 07:23 AM
Interesting research: "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale": Abstract: Smart contracts -- stateful executable objects hosted on blockchains...Bruce Schneier From Schneier on Security | March 6, 2018 at 07:18 AM
Princeton's Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice...Bruce Schneier From Schneier on Security | March 5, 2018 at 12:13 PM
This is fascinating research about how the underlying training data for a machine-learning system can be inadvertently exposed. Basically, if a machine-learning...Bruce Schneier From Schneier on Security | March 5, 2018 at 06:20 AM
Video and short commentary. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | March 2, 2018 at 05:11 PM
Since you don't have enough to worry about, here's a paper postulating that space aliens could send us malware capable of destroying humanity. Abstract: A complex...Bruce Schneier From Schneier on Security | March 2, 2018 at 07:13 AM