From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware...Bruce Schneier From Schneier on Security | February 23, 2016 at 06:49 AM
Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight...Bruce Schneier From Schneier on Security | February 22, 2016 at 07:58 AM
Fascinating story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 19, 2016 at 05:17 PM
I saw two related stories today. The first is about high-denomination currency. The EU is considering dropping its 500-euro note, on the grounds that only criminals...Bruce Schneier From Schneier on Security | February 19, 2016 at 07:34 AM
It's a teenager: British police have arrested a teenager who allegedly was behind a series of audacious -- and, for senior U.S. national security officials, embarrassing...Bruce Schneier From Schneier on Security | February 18, 2016 at 07:02 AM
A judge has ordered that Apple bypass iPhone security in order for the FBI to attempt a brute-force password attack on an iPhone 5c used by one of the San Bernardino...Bruce Schneier From Schneier on Security | February 17, 2016 at 03:15 PM
Trust is a complex social phenomenon, captured very poorly by the binary nature of Internet trust systems. This paper proposes a social consensus system of trust...Bruce Schneier From Schneier on Security | February 17, 2016 at 06:18 AM
More psychological research on our reaction to terrorism and mass violence: The researchers collected posts on Twitter made in response to the 2012 shooting attack...Bruce Schneier From Schneier on Security | February 16, 2016 at 07:27 AM
Interesting paper on the dark web: Daniel Moore & Thomas Rid, "Cryptopolitik and the Darknet," Survival, 2016. (Technical annex here -- requires the Tor browser...Bruce Schneier From Schneier on Security | February 15, 2016 at 07:19 AM
The Monterey Bay Aquarium has a pajama squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.....Bruce Schneier From Schneier on Security | February 12, 2016 at 05:05 PM
A man learned his wife was pregnant from her Fitbit data. The details of the story are weird. The man posted the data to Reddit and asked for analysis help. But...Bruce Schneier From Schneier on Security | February 12, 2016 at 01:16 PM
Interesting research: "CPV: Delay-based Location Verification for the Internet": Abstract: The number of location-aware services over the Internet continues growing...Bruce Schneier From Schneier on Security | February 12, 2016 at 07:19 AM
Today I released my worldwide survey of encryption products. The findings of this survey identified 619 entities that sell encryption products. Of those 412, or...Bruce Schneier From Schneier on Security | February 11, 2016 at 12:05 PM
EPIC has just launched "Data Protection 2016" to try to make privacy an issue in this year's elections. You can buy swag....Bruce Schneier From Schneier on Security | February 11, 2016 at 07:13 AM
AT&T's CEO believes that the company should not offer robust security to its customers: But tech company leaders aren't all joining the fight against the deliberate...Bruce Schneier From Schneier on Security | February 10, 2016 at 02:59 PM
It's National Threat Assessment Day. Published annually by the Director of National Intelligence, the "Worldwide Threat Assessment of the US Intelligence Community"...Bruce Schneier From Schneier on Security | February 9, 2016 at 04:25 PM
As part of a child pornography investigation, the FBI hacked into over 1,300 computers. But after Playpen was seized, it wasn't immediately closed down, unlike...Bruce Schneier From Schneier on Security | February 9, 2016 at 07:25 AM