From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The large accountancy firm Deloitte was hacked, losing client e-mails and files. The hackers had access inside the company's networks for months. Deloitte is doing...Bruce Schneier From Schneier on Security | September 29, 2017 at 07:13 AM
There's a newly discovered bug in Internet Explorer that allows any currently visited website to learn the contents of the address bar when the user hits enter....Bruce Schneier From Schneier on Security | September 28, 2017 at 03:21 PM
New rules give the DHS permission to collect "social media handles, aliases, associated identifiable information, and search results" as part of people's immigration...Bruce Schneier From Schneier on Security | September 28, 2017 at 08:43 AM
Under European law, service providers like Tinder are required to show users what information they have on them when requested. This author requested, and this...Bruce Schneier From Schneier on Security | September 26, 2017 at 08:57 AM
Wired has a story about a possible GPS spoofing attack by Russia: After trawling through AIS data from recent years, evidence of spoofing becomes clear. Goward...Bruce Schneier From Schneier on Security | September 25, 2017 at 09:23 AM
The Boston Red Sox admitted to eavesdropping on the communications channel between catcher and pitcher. Stealing signs is believed to be particularly effective...Bruce Schneier From Schneier on Security | September 22, 2017 at 07:21 AM
The ISO has decided not to approve two NSA-designed block encryption algorithms: Speck and Simon. It's because the NSA is not trusted to put security ahead of surveillance...Bruce Schneier From Schneier on Security | September 21, 2017 at 06:50 AM
New York Times reporter Charlie Savage writes about some bad statistics we're all using: Among surveillance legal policy specialists, it is common to cite a set...Bruce Schneier From Schneier on Security | September 20, 2017 at 07:12 AM
This is a good interview with Apple's SVP of Software Engineering about FaceID. Honestly, I don't know what to think. I am confident that Apple is not collecting...Bruce Schneier From Schneier on Security | September 19, 2017 at 07:44 AM
The Flannery family have caught four giant squid, two this year. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | September 18, 2017 at 03:53 PM
A bunch of Bluetooth vulnerabilities are being reported, some pretty nasty. BlueBorne concerns us because of the medium by which it operates. Unlike the majority...Bruce Schneier From Schneier on Security | September 18, 2017 at 07:58 AM
A new dental imagery method, using squid ink, light, and ultrasound. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | September 15, 2017 at 05:07 PM
I recently wrote about the new ability to disable the Touch ID login on iPhones. This is important because of a weirdness in current US law that protects people's...Bruce Schneier From Schneier on Security | September 15, 2017 at 07:28 AM
Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....Bruce Schneier From Schneier on Security | September 14, 2017 at 07:17 AM
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got...Bruce Schneier From Schneier on Security | September 13, 2017 at 01:49 PM
Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear...Bruce Schneier From Schneier on Security | September 13, 2017 at 07:03 AM
A Raspberry Pi is a tiny computer designed for markers and all sorts of Internet-of-Things types of projects. Make magazine has an article about securing it. Reading...Bruce Schneier From Schneier on Security | September 12, 2017 at 07:12 AM
Andrew "bunnie" Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even...Bruce Schneier From Schneier on Security | September 11, 2017 at 07:12 AM
It's Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 8, 2017 at 05:11 PM
The ShadowBrokers released the manual for UNITEDRAKE, a sophisticated NSA Trojan that targets Windows machines: Able to compromise Windows PCs running on XP, Windows...Bruce Schneier From Schneier on Security | September 8, 2017 at 07:54 AM