From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Suspected members of a European car-theft ring have been arrested:
The criminals targeted vehicles with keyless entry and start systems, exploiting the technology...Bruce Schneier From Schneier on Security | October 17, 2022 at 11:07 AM
It’s aimed at children, but it’s a good primer.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...Bruce Schneier From Schneier on Security | October 14, 2022 at 05:20 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the World Ethical Data Forum, online, October 26-28, 2022.
I’m speaking at the...Schneier.com Webmaster From Schneier on Security | October 14, 2022 at 01:03 PM
In August, the US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency platform Tornado Cash, a virtual currency “mixer” designed to...Bruce Schneier From Schneier on Security | October 14, 2022 at 10:08 AM
These two sites tell you what sorts of information you’re leaking from your browser.Bruce Schneier From Schneier on Security | September 28, 2021 at 10:51 AM
No, I don’t understand it, either.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog...Bruce Schneier From Schneier on Security | September 24, 2021 at 12:21 PM
This isn’t the first time I’ve received an e-mail like this:
Hey! I’ve done my research and looked at a lot of facts and old forgotten archives. I know that you...Bruce Schneier From Schneier on Security | September 24, 2021 at 12:09 PM
The MIT Technology Review is reporting that 2021 is a blockbuster year for zero-day exploits:
One contributing factor in the higher rate of reported zero-days...Bruce Schneier From Schneier on Security | September 24, 2021 at 10:51 AM
ROT8000 is the Unicode equivalent of ROT13. What’s clever about it is that normal English looks like Chinese, and not like ciphertext (to a typical Westerner, that...Bruce Schneier From Schneier on Security | September 23, 2021 at 09:15 AM
The Washington Post reports that the FBI had a decryption key for the REvil ransomware, but didn’t pass it along to victims because it would have disrupted an ongoing...Bruce Schneier From Schneier on Security | September 22, 2021 at 10:30 AM
Apparently, a nation-state hacked Alaska’s Department of Health and Social Services.
Not sure why Alaska’s Department of Health and Social Services is of any interest...Bruce Schneier From Schneier on Security | September 20, 2021 at 06:08 PM
You can find ram’s horn squid shells on beaches in Texas (and presumably elsewhere).
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | September 17, 2021 at 11:46 AM
Citizen Lab released a report on a zero-click iMessage exploit that is used in NSO Group’s Pegasus spyware.
Apple patched the vulnerability; everyone needs to update...Bruce Schneier From Schneier on Security | September 16, 2021 at 04:15 PM
It’s the eyes:
The researchers note that in many cases, users can simply zoom in on the eyes of a person they suspect may not be real to spot the pupil irregularities...Bruce Schneier From Schneier on Security | September 15, 2021 at 11:31 AM
This is a current list of where and when I am scheduled to speak:
I’m keynoting CIISec Live—an all-online event—September 15-16, 2021.
I’m speaking at the Infosecurity...Schneier.com Webmaster From Schneier on Security | September 14, 2021 at 12:19 AM
Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps.
Also see her excellent book on the topic.Bruce Schneier From Schneier on Security | September 13, 2021 at 07:41 AM
Researchers have found possible evidence of paternal care among bigfin reef squid.
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | September 9, 2021 at 05:56 PM
After being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.”Bruce Schneier From Schneier on Security | September 9, 2021 at 05:53 PM
We knew the basics of this story, but it’s good to have more detail.
Here’s me in 2015 about this Juniper hack. Here’s me in 2007 on the NSA backdoor.Bruce Schneier From Schneier on Security | September 7, 2021 at 02:17 PM