From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Humbolt squid are getting smaller: Rawley and the other researchers found a flurry of factors that drove the jumbo squid's demise. The Gulf of California historically...Bruce Schneier From Schneier on Security | July 26, 2019 at 05:42 PM
Add to the "not very smart criminals" file: According to court documents, Tinley provided software services for Siemens' Monroeville, PA offices for nearly ten...Bruce Schneier From Schneier on Security | July 26, 2019 at 07:05 AM
According to a survey: "68% of the security professionals surveyed believe it's a programmer's job to write secure code, but they also think less than half of developers...Bruce Schneier From Schneier on Security | July 24, 2019 at 06:35 PM
Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Speaking at Fordham University in New...Bruce Schneier From Schneier on Security | July 24, 2019 at 07:43 AM
The French army is going to put together a team of science fiction writers to help imagine future threats. Leaving aside the question of whether science fiction...Bruce Schneier From Schneier on Security | July 23, 2019 at 07:27 AM
More nation-state activity in cyberspace, this time from Russia: Per the different reports in Russian media, the files indicate that SyTech had worked since 2009...Bruce Schneier From Schneier on Security | July 22, 2019 at 07:17 AM
Large squid mural in the Bushwick neighborhood of Brooklyn. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | July 19, 2019 at 05:04 PM
I didn't know that Supreme Court Justice John Paul Stevens "was also a cryptographer for the Navy during World War II." He was a proponent of individual privacy...Bruce Schneier From Schneier on Security | July 19, 2019 at 07:19 AM
Identity theft is getting more subtle: "My job application was withdrawn by someone pretending to be me": When Mr Fearn applied for a job at the company he didn't...Bruce Schneier From Schneier on Security | July 18, 2019 at 09:21 AM
The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera. It's a bad vulnerability, made worse by the fact...Bruce Schneier From Schneier on Security | July 16, 2019 at 01:54 PM
Motherboard got its hands on Palantir's Gotham user's manual, which is used by the police to get information on people: The Palantir user guide shows that police...Bruce Schneier From Schneier on Security | July 15, 2019 at 07:12 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at Black Hat USA 2019 in Las Vegas on Wednesday, August 7 and Thurdsay, August 8,...Bruce Schneier From Schneier on Security | July 13, 2019 at 05:18 PM
Cephalopod ancestors once had shells. When did they lose them? With the molecular clock technique, which allowed him to use DNA to map out the evolutionary history...Bruce Schneier From Schneier on Security | July 12, 2019 at 05:32 PM
In Click Here to Kill Everybody, I promised clickable endnotes. They're finally available....Bruce Schneier From Schneier on Security | July 12, 2019 at 03:16 PM
At least one presidential candidate has a policy about quantum computing and encryption. It has two basic planks. One: fund quantum-resistant encryption standards...Bruce Schneier From Schneier on Security | July 12, 2019 at 06:36 AM
If you need to reset the software in your GE smart light bulb -- firmware version 2.8 or later -- just follow these easy instructions: Start with your bulb off...Bruce Schneier From Schneier on Security | July 11, 2019 at 07:24 AM
Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as...Bruce Schneier From Schneier on Security | July 10, 2019 at 06:51 AM
A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more...Bruce Schneier From Schneier on Security | July 9, 2019 at 07:44 AM
MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed...Bruce Schneier From Schneier on Security | July 8, 2019 at 01:38 PM