From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Fascinating story of Tim and Alex Foley, the children of Russian spies Donald Heathfield and Tracey Foley....Bruce Schneier From Schneier on Security | May 10, 2016 at 07:15 AM
An economics professor was detained when he was spotted doing math on an airplane: On Thursday evening, a 40-year-old man -- with dark, curly hair, olive skin...Bruce Schneier From Schneier on Security | May 9, 2016 at 02:15 PM
Last year, the NSA announced its plans for transitioning to cryptography that is resistant to a quantum computer. Now, it's NIST's turn. Its just-released report...Bruce Schneier From Schneier on Security | May 9, 2016 at 07:19 AM
It's a good time to see firefly squid in Japan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | May 6, 2016 at 05:11 PM
The White House has released a report on big-data discrimination. From the blog post: Using case studies on credit lending, employment, higher education, and criminal...Bruce Schneier From Schneier on Security | May 6, 2016 at 07:12 AM
The AT&T TSD was an early 1990s telephone encryption device. It was digital. Voice quality was okay. And it was the device that contained the infamous Clipper Chip...Bruce Schneier From Schneier on Security | May 5, 2016 at 07:31 AM
Forbes estimates that football player Laremy Tunsil lost $7 million in salary because of an ill-advised personal video made public....Bruce Schneier From Schneier on Security | May 4, 2016 at 03:28 PM
Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic...Bruce Schneier From Schneier on Security | May 4, 2016 at 07:51 AM
Turns out there are two different conferences with the title International Conference on Cyber Security (ICCS 2016), one real and one fake. Richard Clayton has...Bruce Schneier From Schneier on Security | May 2, 2016 at 04:45 PM
Interesting research: Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, "Security Analysis of Emerging Smart Home Applications": Abstract: Recently, several competing...Bruce Schneier From Schneier on Security | May 2, 2016 at 10:01 AM
There's a squid shortage along the Pacific coast of the Americas. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | April 29, 2016 at 05:05 PM
I'm writing a book on security in the highly connected Internet-of-Things World. Tentative title: Click Here to Kill Everything Peril and Promise in a Hyper-connected...Bruce Schneier From Schneier on Security | April 29, 2016 at 02:02 PM
In Data and Golliath, I talk about the self-censorship that comes along with broad surveillance. This interesting research documents this phenomenon in Wikipedia...Bruce Schneier From Schneier on Security | April 29, 2016 at 07:28 AM
Amazon Unlimited is a all-you-can-read service. You pay one price and can read anything that's in the program. Amazon pays authors out of a fixed pool, on the basis...Bruce Schneier From Schneier on Security | April 28, 2016 at 09:20 AM
Testimonies of Matt Blaze and Danny Weitzner, both on April 19th before the House Energy and Commerce Committee. And the hearing....Bruce Schneier From Schneier on Security | April 27, 2016 at 07:46 AM
Interesting research: In the study, sponsored in part by the Air Force Office of Scientific Research (AFOSR), the researchers recruited a group of 42 volunteers...Bruce Schneier From Schneier on Security | April 26, 2016 at 10:33 AM
Drones can graffiti walls that no person can reach. (Note that wired.com blocks ad blockers. My trick is to copy the page and then paste it into my text editor.)...Bruce Schneier From Schneier on Security | April 25, 2016 at 01:07 PM
Last week there was a big news story about the Blackberry encryption. The news was that all BlackBerry devices share a global encryption key, and that the Canadian...Bruce Schneier From Schneier on Security | April 25, 2016 at 06:54 AM