From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research found that many banks offer certificate pinning as a security feature, but fail to authenticate the hostname. This leaves the systems open to man-in...Bruce Schneier From Schneier on Security | December 8, 2017 at 07:15 AM
The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am...Bruce Schneier From Schneier on Security | December 6, 2017 at 10:06 AM
Matt Blaze's House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video....Bruce Schneier From Schneier on Security | December 5, 2017 at 07:39 AM
I agree with Lorenzo Franceschi-Bicchierai, "Cryptocurrencies aren't 'crypto'": Lately on the internet, people in the world of Bitcoin and other digital currencies...Bruce Schneier From Schneier on Security | December 4, 2017 at 10:14 AM
Beaked whales, living off the coasts of Ireland, feed on squid. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | December 1, 2017 at 05:22 PM
A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board." In 2006, I wrote...Bruce Schneier From Schneier on Security | December 1, 2017 at 10:56 AM
ZDNet is reporting about another data leak, this one from US Army's Intelligence and Security Command (INSCOM), which is also within to the NSA. The disk image,...Bruce Schneier From Schneier on Security | November 30, 2017 at 07:44 AM
The cell phones we carry with us constantly are the most perfect surveillance device ever invented, and our laws haven't caught up to that reality. That might change...Bruce Schneier From Schneier on Security | November 29, 2017 at 08:33 AM
This is an interesting tactic, and there's a video of it being used: The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull...Bruce Schneier From Schneier on Security | November 28, 2017 at 07:03 AM
Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning: The two hackers...Bruce Schneier From Schneier on Security | November 27, 2017 at 10:13 AM
Falsely labeled squid snacks were seized in Cambodia. I don't know what food product it really was. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | November 24, 2017 at 05:31 PM
Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more....Bruce Schneier From Schneier on Security | November 23, 2017 at 01:31 PM
The security researchers at Princeton are posting You may know that most websites have third-party analytics scripts that record which pages you visit and the searches...Bruce Schneier From Schneier on Security | November 22, 2017 at 09:54 AM
Amazon has a cloud for U.S. classified data. The physical and computer requirements for handling classified information are considerable, both in terms of technology...Bruce Schneier From Schneier on Security | November 21, 2017 at 07:16 AM
Amazon Key is an IoT door lock that can enable one-time access codes for delivery people. To further secure that system, Amazon sells Cloud Cam, a camera that watches...Bruce Schneier From Schneier on Security | November 20, 2017 at 07:19 AM
Peru and Chile have a new plan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | November 17, 2017 at 06:04 PM
The White House has released a new version of the Vulnerabilities Equities Process (VEP). This is the inter-agency process by which the US government decides whether...Bruce Schneier From Schneier on Security | November 17, 2017 at 07:02 AM
This digital security guide by Motherboard is very good. I put alongside EFF's "Surveillance Self-Defense" and John Scott-Railton's "Digital Security Low Hanging...Bruce Schneier From Schneier on Security | November 16, 2017 at 07:53 AM
It only took a week: On Friday, Vietnamese security firm Bkav released a blog post and video showing that -- by all appearances -- they'd cracked FaceID with a...Bruce Schneier From Schneier on Security | November 15, 2017 at 07:54 AM
The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA...Bruce Schneier From Schneier on Security | November 14, 2017 at 07:08 AM