From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Google has demonstrated exploiting the Spectre CPU attack remotely over the web:
Today, we’re sharing proof-of-concept (PoC) code that confirms the practicality...Bruce Schneier From Schneier on Security | March 17, 2021 at 02:19 PM
Security researchers have recently discovered a botnet with a novel defense against takedowns. Normally, authorities can disable a botnet by taking over its command...Bruce Schneier From Schneier on Security | March 15, 2021 at 04:13 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the Australian Cyber Conference 2021 on March 17 and 18, 2021.
I’m keynotingRSA...Schneier.com Webmaster From Schneier on Security | March 13, 2021 at 10:32 PM
Nick Weaver has an excellent post on the Microsoft Exchange hack:
The investigative journalist Brian Krebs has produced a handy timeline of events and a few things...Bruce Schneier From Schneier on Security | March 9, 2021 at 05:34 PM
Andrew Appel and Susan Greenhalgh have a blog post on the insecurity of ES&S’s software authentication system:
It turns out that ES&S has bugs in their hash-code...Bruce Schneier From Schneier on Security | March 9, 2021 at 05:27 PM
Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“:
Abstract: Overnight, Apple has...Bruce Schneier From Schneier on Security | March 9, 2021 at 03:50 PM
Really interesting research:
“Exploitation and Sanitization of Hidden Data in PDF Files”
Abstract: Organizations publish and share more and more electronic documents...Bruce Schneier From Schneier on Security | March 9, 2021 at 03:45 PM
Science has a paper (and commentary) on generating 250 random terabits per second with a laser. I don’t know how cryptographically secure they are, but that can...Bruce Schneier From Schneier on Security | March 9, 2021 at 03:42 PM
How is this even possible?
…26% of companies Positive Technologies tested were vulnerable to WannaCry, which was a threat years ago, and some even vulnerable to...Bruce Schneier From Schneier on Security | March 5, 2021 at 04:18 PM
Squid ink.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | March 5, 2021 at 04:15 PM
Interesting paper: “Shadow Attacks: Hiding and Replacing Content in Signed PDFs“:
Abstract: Digitally signed PDFs are used in contracts and invoices to guarantee...Bruce Schneier From Schneier on Security | March 5, 2021 at 04:13 PM
I have been seeing this paper by cryptographer Peter Schnorr making the rounds: “Fast Factoring Integers by SVP Algorithms.” It describes a new factoring method...Bruce Schneier From Schneier on Security | March 5, 2021 at 11:48 AM
Microsoft has issued an emergency Microsoft Exchange patch to fix four zero-day vulnerabilities currently being exploited by China.Bruce Schneier From Schneier on Security | March 4, 2021 at 02:03 PM
NASA made an oblique reference to a coded message in the color pattern of the Perseverance Mars Lander ‘s parachute.
More information.Bruce Schneier From Schneier on Security | February 26, 2021 at 02:35 PM
Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated)...Bruce Schneier From Schneier on Security | February 25, 2021 at 03:27 PM
Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company...Bruce Schneier From Schneier on Security | February 25, 2021 at 03:23 PM
A 30-million-year-old vampire squid fossil was found, lost, and then re-found in Hungary.
As usual, you can also use this squid post to talk about the securityhere...Bruce Schneier From Schneier on Security | February 25, 2021 at 03:12 PM
A good tutorial:
But we can go beyond the polarization of electrons and really leverage the electron waviness. By interleaving thin layers of superconducting and...Bruce Schneier From Schneier on Security | February 25, 2021 at 03:12 PM
This is weird:
Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So far, however...Bruce Schneier From Schneier on Security | February 23, 2021 at 03:09 PM