From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Research into one VM stealing crypto keys from another VM running on the same hardware.
ABSTRACT: This paper details the construction of an access-driven side...schneier From Schneier on Security | November 16, 2012 at 12:13 PM
This is idiotic:
Public Intelligence recently posted a Powerpoint presentation from the NYC fire department (FDNY) discussing the unique safety issues mobile food...schneier From Schneier on Security | November 15, 2012 at 12:45 PM
I noticed this amongst the details of the Petraeus scandal:
Petraeus and Broadwell apparently used a trick, known to terrorists and teenagers alike, to conceal...schneier From Schneier on Security | November 14, 2012 at 06:28 PM
At least, that's the story:
The locks at the Tower of London, home to the Crown Jewels, had to be
changed after a burglar broke in and stole keys.
The intruder...schneier From Schneier on Security | November 14, 2012 at 11:57 AM
Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...schneier From Schneier on Security | November 13, 2012 at 12:15 PM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...schneier From Schneier on Security | November 12, 2012 at 11:47 AM
Burger King introduces a black burger with ketchup that includes squid ink. Only in Japan, of course.schneier From Schneier on Security | November 9, 2012 at 10:16 PM
From the Department of Homeland Security, a handy list of 19 suspicious behaviors that could indicate that a hotel guest is actually a terrorist.
I myself have...schneier From Schneier on Security | November 9, 2012 at 07:32 PM
Interesting research from RAND:
Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...schneier From Schneier on Security | November 9, 2012 at 12:41 PM
Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted.
Creating a cyber-rock is cheap. Buying...schneier From Schneier on Security | November 8, 2012 at 07:24 PM
Here's a great concept: a micromort:
Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...schneier From Schneier on Security | November 8, 2012 at 12:57 PM
It's hard for me to get too worked up about this vulnerability:
Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...schneier From Schneier on Security | November 7, 2012 at 07:39 PM
This is the sort of thing I wrote about in my latest book.
The Prisoners Dilemma as outlined above can be seen in action in two variants within regulatory activities...schneier From Schneier on Security | November 7, 2012 at 02:16 PM
Expensive, but it's in complete working order. They're also auctioning off a complete set of rotors; those are even rarer than the machines -- which are often missing...schneier From Schneier on Security | November 6, 2012 at 06:17 PM
Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...schneier From Schneier on Security | November 6, 2012 at 04:13 PM
It doesn't look good.
These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...schneier From Schneier on Security | November 6, 2012 at 12:40 PM
I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.schneier From Schneier on Security | November 5, 2012 at 08:54 PM
I'd sure like to know more about this:
Government code-breakers are working on deciphering a message that has remained a secret for 70 years.
It was found onSome...schneier From Schneier on Security | November 5, 2012 at 07:26 PM
I've written about it before, but not half as well as this story:
"That search was absolutely useless." I said. "And just shows how much of all of this is security...schneier From Schneier on Security | November 5, 2012 at 12:19 PM