From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...schneier From Schneier on Security | January 31, 2014 at 07:16 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
HOWLERMONKEY
(TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...schneier From Schneier on Security | January 30, 2014 at 09:38 PM
The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...schneier From Schneier on Security | January 30, 2014 at 01:08 PM
This looks to be very good.
Add that to these three indexes of NSA source material, and these two summaries.
This excellent parody website has a good collection...schneier From Schneier on Security | January 30, 2014 at 07:52 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
GINSU
(TS//SI//REL) GINSU provides software application persistence for the...schneier From Schneier on Security | January 29, 2014 at 03:28 PM
Interesting paper: "The value of Online Privacy," by Scott Savage and Donald M. Waldman.
Abstract: We estimate the value of online privacy with a differentiated...schneier From Schneier on Security | January 29, 2014 at 01:26 PM
This is very good:
...one might suppose that modern democratic states, with the lessons of history at hand, would seek to minimize fear or at least minimizeThey...schneier From Schneier on Security | January 29, 2014 at 07:24 AM
Back in December, Der Spiegel published a lot of information about the NSA's Tailored Access Operations (TAO) group, including a 2008 catalog of hardware and software...schneier From Schneier on Security | January 28, 2014 at 03:13 PM
Now we know why the president gave his speech on NSA surveillance last week; he wanted to get ahead of the Privacy and Civil Liberties Oversight Board.
Last week...schneier From Schneier on Security | January 28, 2014 at 01:39 PM
This makes a lot of sense.
Viviane Reding dismissed recent fines for Google as "pocket money" and said the firm would have had to pay $1bn under her plans for...schneier From Schneier on Security | January 28, 2014 at 07:47 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SPARROW II
(TS//SI//REL) An embedded computer system running BLINDDATE tools...schneier From Schneier on Security | January 27, 2014 at 09:06 PM
Microsoft is trying to stop supporting Windows XP. The problem is that a majority of ATMs still use that OS. And once Microsoft stops issuing security updates...schneier From Schneier on Security | January 27, 2014 at 07:32 AM
It's big: 13 feet long.
The fisherman was stunned to discover the giant squid trapped in his net, having been caught at a depth of around 70m, about two-thirds...schneier From Schneier on Security | January 24, 2014 at 05:15 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
PHOTOANGLO
(TS//SI//REL TO USA,FVEY) PHOTOANGLO is a joint NSA/GCHQ project...schneier From Schneier on Security | January 24, 2014 at 03:09 PM
I'm sure this is a pirated copy.
Looking at it, it's amazing how long ago twenty years was.schneier From Schneier on Security | January 24, 2014 at 01:43 PM
This is an interesting way to characterizing income inequality as a security issue:
…growing inequality menaces vigorous societies. It is a proxy for how effectively...schneier From Schneier on Security | January 24, 2014 at 07:51 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTWATCH
(TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...schneier From Schneier on Security | January 23, 2014 at 03:39 PM
Tim Hartford talks about consumer manipulation:
Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...schneier From Schneier on Security | January 23, 2014 at 08:03 AM
Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTSTAND
(TS//SI//REL) An active 802.11 wireless exploitation and injection...schneier From Schneier on Security | January 22, 2014 at 03:15 PM
Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...schneier From Schneier on Security | January 22, 2014 at 01:19 PM