From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Intercept has "a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies."...Bruce Schneier From Schneier on Security | December 17, 2015 at 01:06 PM
This should come as no surprise: users often compromise their own security by making mistakes setting up and using their encryption apps. Paper: "On the Security...Bruce Schneier From Schneier on Security | December 17, 2015 at 07:46 AM
Yesterday, the city of Los Angeles closed all of its schools -- over 1,000 schools -- because of a bomb threat. It was a hoax. LA officials defended the move, with...Bruce Schneier From Schneier on Security | December 16, 2015 at 07:28 AM
Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...Bruce Schneier From Schneier on Security | December 15, 2015 at 01:19 AM
The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....Bruce Schneier From Schneier on Security | December 14, 2015 at 06:46 AM
Neat: While the Dana octopus squid may lack a squid's trademark trailing tentacles, it makes up for them in spectacular lighting equipment, with two of its muscular...Bruce Schneier From Schneier on Security | December 11, 2015 at 05:02 PM
I'll be participating in an end-of-year trends and predictions webinar on Thursday, December 17, at 1:00 PM EST. Join me here. In other news, Resilient has joined...Bruce Schneier From Schneier on Security | December 11, 2015 at 03:56 PM
A Florida woman drove away after an accident, but her car automatically reported it anyway. She was arrested....Bruce Schneier From Schneier on Security | December 11, 2015 at 07:48 AM
Interesting research: "Identifying patterns in informal sources of security information," by Emilee Rader and Rick Wash, Journal of Cybersecurity, 1 Dec 2015. Abstract...Bruce Schneier From Schneier on Security | December 10, 2015 at 07:54 AM
I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...Bruce Schneier From Schneier on Security | December 9, 2015 at 02:48 PM
Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...Bruce Schneier From Schneier on Security | December 8, 2015 at 08:25 AM
Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...Bruce Schneier From Schneier on Security | December 7, 2015 at 06:35 AM
I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...Bruce Schneier From Schneier on Security | December 4, 2015 at 05:22 PM
BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...Bruce Schneier From Schneier on Security | December 4, 2015 at 07:40 AM
Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...Bruce Schneier From Schneier on Security | December 3, 2015 at 03:49 PM
Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...Bruce Schneier From Schneier on Security | December 3, 2015 at 08:55 AM
This article demonstrates that security is less important than functionality. When asked about their preference if they needed to choose between IT security and...Bruce Schneier From Schneier on Security | December 2, 2015 at 07:14 AM
Someone opened a LifeLock account in his ex-wife's name, and used the service to track her bank accounts, credit cards, and other financial activities. The article...Bruce Schneier From Schneier on Security | December 1, 2015 at 06:41 AM
This New Yorker article traces the history of privacy from the mid 1800s to today: As a matter of historical analysis, the relationship between secrecy and privacy...Bruce Schneier From Schneier on Security | November 30, 2015 at 01:47 PM