From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Apple will start requiring standardized privacy labels for apps in its app store, starting in December:
Apple allows data disclosure to be optional if all of the...Bruce Schneier From Schneier on Security | November 11, 2020 at 12:36 PM
It seems that this election season has not gone without fraud. In New Zealand, a vote for “Bird of the Year” has been marred by fraudulent votes:
More than 1,500...Bruce Schneier From Schneier on Security | November 11, 2020 at 12:22 PM
Proctoring an online exam is hard. It’s hard to be sure that the student isn’t cheating, maybe by having reference materials at hand, or maybe by substituting someone...Bruce Schneier From Schneier on Security | November 11, 2020 at 11:25 AM
Over at Lawfare: “2020 Is An Election Security Success Story (So Far).”
What’s more, the voting itself was remarkably smooth. It was only a few months ago that...Bruce Schneier From Schneier on Security | November 9, 2020 at 04:43 PM
Research paper: Rick Wash, “How Experts Detect Phishing Scam Emails“:
Abstract: Phishing scam emails are emails that pretend to be something they are not in order...Bruce Schneier From Schneier on Security | November 5, 2020 at 10:30 AM
California’s Proposition 24, aimed at improving the California Consumer Privacy Act, passed this week. Analyses are very mixed. I was very mixed on the proposition...Bruce Schneier From Schneier on Security | November 5, 2020 at 10:28 AM
Accuracy isn’t great, but that it can be done at all is impressive.
Murtuza Jadiwala, a computer science professor heading the research project, said his team...Bruce Schneier From Schneier on Security | November 4, 2020 at 11:28 AM
Google’s Project Zero has discovered and published a buffer overflow vulnerability in the Windows Kernel Cryptography Driver. The exploit doesn’t affect the cryptography...Bruce Schneier From Schneier on Security | November 2, 2020 at 03:01 PM
Sunoo Park and Kendra Albert have published “A Researcher’s Guide to Some Legal Risks of Security Research.”
From a summary:
Such risk extends beyond anti-hacking...Bruce Schneier From Schneier on Security | October 30, 2020 at 10:14 AM
This is the first video footage of a ram’s horn squid (Spirula spirula) .
As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | October 29, 2020 at 10:55 AM
A security researcher discovered a wulnerability in Waze that breaks the anonymity of users:
I found out that I can visit Waze from any web browser at waze.com/livemap...Bruce Schneier From Schneier on Security | October 29, 2020 at 10:52 AM
This is neat:
By generating powerful streams of water, UCSD’s squid-like robot can swim untethered. The “squidbot” carries its own power source, and has the room...Bruce Schneier From Schneier on Security | October 28, 2020 at 10:40 AM
Senator Ron Wyden asked, and the NSA didn’t answer:
The NSA has long sought agreements with technology companies under which they would build special access for...Bruce Schneier From Schneier on Security | October 28, 2020 at 10:38 AM
Slate magazine was able to cleverly read the Ghislaine Maxwell deposition and reverse-engineer many of the redacted names.
We’ve long known that redacting is hard...Bruce Schneier From Schneier on Security | October 26, 2020 at 11:37 PM
Squid geopolitics.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines...Bruce Schneier From Schneier on Security | October 26, 2020 at 04:03 PM
Gizmodo is reporting that Harris Corp. is no longer selling Stingray IMSI-catchers (and, presumably, its follow-on models Hailstorm and Crossbow) to local governments...Bruce Schneier From Schneier on Security | October 25, 2020 at 09:57 PM
There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it...Bruce Schneier From Schneier on Security | October 23, 2020 at 09:47 AM
The NSA released an advisory listing the top twenty-five known vulnerabilities currently being exploited by Chinese nation-state attackers.
This advisory provides...Bruce Schneier From Schneier on Security | October 21, 2020 at 10:21 AM
Interview with Mike Vecchione, Curator of Cephalopoda — now that’s a job title — at the Smithsonian Museum of National History.
One reason they’re so interesting...Bruce Schneier From Schneier on Security | October 16, 2020 at 04:30 PM
The Hewlett Foundation just announced its top five ideas in its Cybersecurity Visuals Challenge. The problem Hewlett is trying to solve is the dearth of good visuals...Bruce Schneier From Schneier on Security | October 16, 2020 at 04:29 PM