From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
No real surprises, but we finally have the story.
The story he went on to tell is strikingly straightforward. De Guzman was poor, and internet access was expensive...Bruce Schneier From Schneier on Security | September 21, 2020 at 08:58 PM
I thought the virus doesn’t survive well on food packaging:
Authorities in China’s northeastern Jilin province have found the novel coronavirus on the packaging...Bruce Schneier From Schneier on Security | September 21, 2020 at 08:58 PM
The founder and CEO of the Internet security company NS8 has been arrested and “charged in a Complaint in Manhattan federal court with securities fraud, fraud in...Bruce Schneier From Schneier on Security | September 18, 2020 at 02:22 PM
Amazon drivers — all gig workers who don’t work for the company — are hanging cell phones in trees near Amazon delivery stations, fooling the system into thinking...Bruce Schneier From Schneier on Security | September 17, 2020 at 02:28 PM
SQUID news:
Physicists have developed a small, compact superconducting quantum interference device (SQUID) that can detect magnetic fields. The team l focused on...Bruce Schneier From Schneier on Security | September 17, 2020 at 11:35 AM
Matt Blaze discusses an interesting mystery about a Cuban one-time-pad radio station, and a random number generator error that probably helped arrest a pair of...Bruce Schneier From Schneier on Security | September 15, 2020 at 11:50 AM
There’s a new unpatched Bluetooth vulnerability:
The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is...Bruce Schneier From Schneier on Security | September 15, 2020 at 11:48 AM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the Cybersecurity Law & Policy Scholars Virtual Conference on September 17, 2020...Schneier.com Webmaster From Schneier on Security | September 14, 2020 at 10:18 PM
St. Louis Magazine answers the important question: “Is there a difference between calamari and squid?” Short answer: no.
As usual, you can also use this squid post...Bruce Schneier From Schneier on Security | September 11, 2020 at 02:24 PM
The Grugq has written an excellent essay on how the Russian cybercriminal gang FIN7 operates. An excerpt:
The secret of FIN7’s success is their operational art...Bruce Schneier From Schneier on Security | September 9, 2020 at 03:03 PM
Interesting privacy analysis of the Ambient Light Sensor API. And a blog post. Especially note the “Lessons Learned” section.Bruce Schneier From Schneier on Security | September 9, 2020 at 02:51 PM
It’s complicated, but it’s basically a man-in-the-middle attack that involves two smartphones. The first phone reads the actual smartcard, and then forwards the...Bruce Schneier From Schneier on Security | September 9, 2020 at 02:50 PM
Harvard Kennedy School’s Belfer Center published the “National Cyber Power Index 2020: Methodology and Analytical Considerations.”
The rankings:
US
China
UK
...Bruce Schneier From Schneier on Security | September 9, 2020 at 12:34 PM
Ross Anderson’s fantastic textbook, Security Engineering, will have a third edition. The book won’t be published until December, but Ross has been making drafts...Bruce Schneier From Schneier on Security | September 9, 2020 at 12:14 PM
The Trump Administration just published “Space Policy Directive – 5“: “Cybersecurity Principles for Space Systems.” It’s pretty general:
Principles. (a) Space systems...Bruce Schneier From Schneier on Security | September 8, 2020 at 05:38 PM
Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard.
Recently, Daniel Apon of NIST gave a talk detailing the selection...Bruce Schneier From Schneier on Security | September 8, 2020 at 03:47 PM
Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard.
Recently, Daniel Apon of NIST gave a talk detailing the selection...Bruce Schneier From Schneier on Security | September 8, 2020 at 03:47 PM
Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection...Bruce Schneier From Schneier on Security | September 8, 2020 at 07:12 AM