From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
US Cyber Command has uploaded North Korean malware samples to the VirusTotal aggregation repository, adding to the malware samples it uploaded in February. The...Bruce Schneier From Schneier on Security | May 14, 2020 at 07:29 AM
The Army is developing a new electronic warfare pod capable of being put on drones and on trucks. ...the Silent Crow pod is now the leading contender for the flying...Bruce Schneier From Schneier on Security | May 13, 2020 at 09:49 AM
The attack requires physical access to the computer, but it's pretty devastating: On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique...Bruce Schneier From Schneier on Security | May 12, 2020 at 07:09 AM
The California Consumer Privacy Act is a lesson in missed opportunities. It was passed in haste, to stop a ballot initiative that would have been even more restrictive...Bruce Schneier From Schneier on Security | May 11, 2020 at 11:58 AM
It's the oldest squid attack on record: An ancient squid-like creature with 10 arms covered in hooks had just crushed the skull of its prey in a vicious attack...Bruce Schneier From Schneier on Security | May 8, 2020 at 05:17 PM
Used Tesla components, sold on eBay, still contain personal information, even after a factory reset. This is a decades-old problem. It's a problem with used hard...Bruce Schneier From Schneier on Security | May 8, 2020 at 10:46 AM
This is a good explanation of an iOS bug that allowed someone to break out of the application sandbox. A summary: What a crazy bug, and Siguza's explanation is...Bruce Schneier From Schneier on Security | May 7, 2020 at 10:56 AM
It's the twentieth anniversary of the ILOVEYOU virus, and here are three interesting articles about it and its effects on software design....Bruce Schneier From Schneier on Security | May 6, 2020 at 07:47 AM
Interesting story of malware hidden in Google Apps. This particular campaign is tied to the government of Vietnam. At a remote virtual version of its annual Security...Bruce Schneier From Schneier on Security | May 5, 2020 at 07:03 AM
This paper describes a SIGINT and code-breaking alliance between Denmark, Sweden, Germany, the Netherlands and France called Maximator: Abstract: This article is...Bruce Schneier From Schneier on Security | May 4, 2020 at 07:42 AM
Makes sense; there's room inside a squid's body cavity: Latin American drug lords have sent bumper shipments of cocaine to Europe in recent weeks, including one...Bruce Schneier From Schneier on Security | May 1, 2020 at 05:06 PM
I was quoted in BuzzFeed: "My problem with contact tracing apps is that they have absolutely no value," Bruce Schneier, a privacy expert and fellow at the Berkman...Bruce Schneier From Schneier on Security | May 1, 2020 at 07:22 AM
The NSA just published a survey of video conferencing apps. So did Mozilla. Zoom is on the good list, with some caveats. The company has done a lot of work addressing...Bruce Schneier From Schneier on Security | April 30, 2020 at 11:24 AM
This is interesting: Facebook Inc. in 2018 beat back federal prosecutors seeking to wiretap its encrypted Messenger app. Now the American Civil Liberties Union...Bruce Schneier From Schneier on Security | April 29, 2020 at 01:29 PM
MIT researchers have built a system that fools natural-language processing systems by swapping words with synonyms: The software, developed by a team at MIT, looks...Bruce Schneier From Schneier on Security | April 28, 2020 at 11:38 AM
Instacart is taking legal action against bots that automatically place orders: Before it closed, to use Cartdash users first selected what items they want from...Bruce Schneier From Schneier on Security | April 27, 2020 at 07:13 AM
This is neat: Deep in the Pacific Ocean, six-foot-long Humboldt squid are known for being aggressive, cannibalistic and, according to new research, good communicators...Bruce Schneier From Schneier on Security | April 24, 2020 at 05:15 PM
OneZero is tracking thirty countries around the world who are implementing surveillance programs in the wake of COVID-19: The most common form of surveillance implemented...Bruce Schneier From Schneier on Security | April 24, 2020 at 07:02 AM
The New York Times is reporting on state-sponsored disinformation campaigns coming out of China: Since that wave of panic, United States intelligence agencies have...Bruce Schneier From Schneier on Security | April 23, 2020 at 01:01 PM
Last year, ZecOps discovered two iPhone zero-day exploits. They will be patched in the next iOS release: Avraham declined to disclose many details about who the...Bruce Schneier From Schneier on Security | April 22, 2020 at 10:12 AM