From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A researcher was able to steal money from Starbucks by exploiting a race condition in their gift-card value-transfer protocol. Basically, by initiating two identical...Bruce Schneier From Schneier on Security | May 26, 2015 at 05:58 PM
They're coming to the US: It's called Skunk, a type of "malodorant," or in plainer language, a foul-smelling liquid. Technically nontoxic but incredibly disgusting...Bruce Schneier From Schneier on Security | May 26, 2015 at 07:18 AM
Interesting story of a complex and deeply hidden bug -- with AES as a part of it....Bruce Schneier From Schneier on Security | May 25, 2015 at 10:20 AM
The latest one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 22, 2015 at 05:39 PM
A man was arrested for drug dealing based on the IP address he used while querying the USPS package tracking website....Bruce Schneier From Schneier on Security | May 22, 2015 at 01:33 PM
The ACLU's Chris Soghoian explains (time 25:52-30:55) why the current debate over Section 215 of the Patriot Act is just a minor facet of a large and complex bulk...Bruce Schneier From Schneier on Security | May 22, 2015 at 06:45 AM
This is interesting: The surveys find that Americans feel privacy is important in their daily lives in a number of essential ways. Yet, they have a pervasive sense...Bruce Schneier From Schneier on Security | May 21, 2015 at 02:05 PM
Logjam is a new attack against the Diffie-Hellman key-exchange protocol used in TLS. Basically: The Logjam attack allows a man-in-the-middle attacker to downgrade...Bruce Schneier From Schneier on Security | May 21, 2015 at 07:36 AM
New research indicates that it's very hard to completely patch systems against vulnerabilities: It turns out that it may not be that easy to patch vulnerabilities...Bruce Schneier From Schneier on Security | May 20, 2015 at 03:15 PM
Used by the Soviet Union during the Cold War: A defecting agent revealed that powder containing both luminol and a substance called nitrophenyl pentadien (NPPD)...Bruce Schneier From Schneier on Security | May 20, 2015 at 09:08 AM
Last month ago I blogged aboutsecurity researcher Chris Roberts being detained by the FBI after tweeting about avionics security while on a United flight: But to...Bruce Schneier From Schneier on Security | May 19, 2015 at 09:00 AM
NASA is funding a study for a squid rover that could explore Europa's oceans. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | May 15, 2015 at 05:08 PM
Interesting: Franzosa and colleagues used publicly available microbiome data produced through the Human Microbiome Project (HMP), which surveyed microbes in the...Bruce Schneier From Schneier on Security | May 15, 2015 at 07:20 AM
On April 1, I announced the Eighth Movie Plot Threat Contest: demonstrate the evils of encryption. Not a whole lot of good submissions this year. Possibly this...Bruce Schneier From Schneier on Security | May 15, 2015 at 12:26 AM
Admiral Mike Rogers gave the keynote address at the Joint Service Academy Cyber Security Summit today at West Point. He started by explaining the four tenets of...Bruce Schneier From Schneier on Security | May 14, 2015 at 02:12 PM
The city of Paradise Valley, AZ, is hiding license plate scanners in fake cactus plants....Bruce Schneier From Schneier on Security | May 14, 2015 at 07:18 AM
This 1947 document describes a German machine to cryptanalyze the American M-209 mechanical encryption machine. I can't figure out anything about how it works.....Bruce Schneier From Schneier on Security | May 13, 2015 at 12:05 PM
Anyone can design a cipher that he himself cannot break. This is why you should uniformly distrust amateur cryptography, and why you should only use published algorithms...Bruce Schneier From Schneier on Security | May 12, 2015 at 06:46 AM