From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network...Bruce Schneier From Schneier on Security | March 1, 2018 at 07:47 AM
Apple is bowing to pressure from the Chinese government and storing encryption keys in China. While I would prefer it if it would take a stand against China, I...Bruce Schneier From Schneier on Security | February 28, 2018 at 07:19 AM
Forbes reports that the Israeli company Cellebrite can probably unlock all iPhone models: Cellebrite, a Petah Tikva, Israel-based vendor that's become the U.S....Bruce Schneier From Schneier on Security | February 27, 2018 at 06:58 AM
If you're going to commit an illegal act, it's best not to discuss it in e-mail. It's also best to Google tech instructions rather than asking someone else to do...Bruce Schneier From Schneier on Security | February 26, 2018 at 04:39 PM
This is the story of the Hawaiian bobtail squid and Vibrio fischeri. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | February 23, 2018 at 05:20 PM
I joined a letter supporting the Secure Elections Act (S. 2261): The Secure Elections Act strikes a careful balance between state and federal action to secure American...Bruce Schneier From Schneier on Security | February 23, 2018 at 07:11 AM
People harassing women by delivering anonymous packages purchased from Amazon. On the one hand, there is nothing new here. This could have happened decades ago,...Bruce Schneier From Schneier on Security | February 22, 2018 at 07:04 AM
Researchers have discovered new variants of Spectre and Meltdown. The software mitigations for Spectre and Meltdown seem to block these variants, although the eventual...Bruce Schneier From Schneier on Security | February 21, 2018 at 07:13 AM
It's not a great solution, but it's something: The process of using postcards containing a specific code will be required for advertising that mentions a specific...Bruce Schneier From Schneier on Security | February 20, 2018 at 07:34 AM
Interesting history of the security of walls: Dún Aonghasa presents early evidence of the same principles of redundant security measures at work in 13th century...Bruce Schneier From Schneier on Security | February 19, 2018 at 05:24 PM
There's a squid pin on Kickstarter. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...Bruce Schneier From Schneier on Security | February 16, 2018 at 05:08 PM
The National Academies has just published "Decrypting the Encryption Debate: A Framework for Decision Makers." It looks really good, although I have not read it...Bruce Schneier From Schneier on Security | February 16, 2018 at 10:17 AM
Good Washington Post op-ed on the need to use voter-verifiable paper ballots to secure elections, as well as risk-limiting audits....Bruce Schneier From Schneier on Security | February 15, 2018 at 10:14 AM
Everything online is hackable. This is true for Equifax's data and the federal Office of Personal Management's data, which was hacked in 2015. If information is...Bruce Schneier From Schneier on Security | February 14, 2018 at 07:43 AM
Nice profile of Mordechai Guri, who researches a variety of clever ways to steal data over air-gapped computers. Guri and his fellow Ben-Gurion researchers have...Bruce Schneier From Schneier on Security | February 13, 2018 at 07:26 AM
There are a lot: The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related...Bruce Schneier From Schneier on Security | February 12, 2018 at 07:36 AM
Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | February 9, 2018 at 05:17 PM
In "The House that spied on Me," Kashmir Hill outfits her home to be as "smart" as possible and writes about the results....Bruce Schneier From Schneier on Security | February 9, 2018 at 08:59 AM
A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine...Bruce Schneier From Schneier on Security | February 8, 2018 at 12:55 PM
This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is...Bruce Schneier From Schneier on Security | February 7, 2018 at 07:19 AM