From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
David Omand -- GCHQ director from 1996-1997, and the UK's security and intelligence coordinator from 2000-2005 -- has just published a new paper: "Understanding...Bruce Schneier From Schneier on Security | March 20, 2015 at 02:51 PM
Last May, we learned that the NSA intercepts equipment being shipped around the world and installs eavesdropping implants. There were photos of NSA employees opening...Bruce Schneier From Schneier on Security | March 20, 2015 at 07:56 AM
Right now, the book is #6 on the New York Times best-seller list in hardcover nonfiction, and #13 in combined print and e-book nonfiction. This is the March 22...Bruce Schneier From Schneier on Security | March 19, 2015 at 03:49 PM
New research: Max Abrahms and Philip B.K. Potter, "Explaining Terrorism: Leadership Deficits and Militant Group Tactics," International Organizations. Abstract:...Bruce Schneier From Schneier on Security | March 19, 2015 at 10:41 AM
New research: "How Polymorphic Warnings Reduce Habituation in the Brain - Insights from an fMRI Study." Abstract: Research on security warnings consistently points...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:48 AM
Spicy squid masala stir-fry. Easy and delicious. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:30 AM
The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:09 AM
Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber"...Bruce Schneier From Schneier on Security | March 18, 2015 at 05:22 AM
The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...Bruce Schneier From Schneier on Security | March 18, 2015 at 03:50 AM
I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies...Bruce Schneier From Schneier on Security | March 18, 2015 at 12:13 AM
The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...Bruce Schneier From Schneier on Security | March 12, 2015 at 03:59 PM
Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...Bruce Schneier From Schneier on Security | March 12, 2015 at 07:22 AM
More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...Bruce Schneier From Schneier on Security | March 11, 2015 at 03:41 PM
The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...Bruce Schneier From Schneier on Security | March 11, 2015 at 07:53 AM
The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...Bruce Schneier From Schneier on Security | March 10, 2015 at 03:59 PM
New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...Bruce Schneier From Schneier on Security | March 10, 2015 at 07:50 AM
Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...Bruce Schneier From Schneier on Security | March 9, 2015 at 02:46 PM
The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...Bruce Schneier From Schneier on Security | March 9, 2015 at 08:57 AM
There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...Bruce Schneier From Schneier on Security | March 6, 2015 at 05:21 PM
Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...Bruce Schneier From Schneier on Security | March 6, 2015 at 03:52 PM