From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is an easy fried squid recipe with saffron and agrodolce. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | April 5, 2019 at 05:29 PM
A recent article overhyped the release of EverCrypt, a cryptography library created using formal methods to prove security against specific attacks. The Quantum...Bruce Schneier From Schneier on Security | April 5, 2019 at 10:31 AM
This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock...Bruce Schneier From Schneier on Security | April 4, 2019 at 03:10 PM
Researchers have been able to fool Tesla's autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of...Bruce Schneier From Schneier on Security | April 4, 2019 at 07:18 AM
Really interesting report from Tactical Tech. Data-driven technologies are an inevitable feature of modern political campaigning. Some argue that they are a welcome...Bruce Schneier From Schneier on Security | April 3, 2019 at 07:26 AM
This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I...Bruce Schneier From Schneier on Security | April 2, 2019 at 07:16 AM
Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and...Bruce Schneier From Schneier on Security | April 1, 2019 at 10:44 AM
It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | March 29, 2019 at 05:15 PM
This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA's DOUBLEPULSAR...Bruce Schneier From Schneier on Security | March 29, 2019 at 07:11 AM
Kaspersky Labs is reporting on a new supply chain attack they call "Shadowhammer." In January 2019, we discovered a sophisticated supply chain attack involving...Bruce Schneier From Schneier on Security | March 28, 2019 at 07:42 AM
A university study confirmed the obvious: if you pay a random bunch of freelance programmers a small amount of money to write security software, they're not going...Bruce Schneier From Schneier on Security | March 27, 2019 at 07:37 AM
A recent experiment found all sorts of personal data left on used laptops and smartphones. This should come as no surprise. Simson Garfinkel performed the same...Bruce Schneier From Schneier on Security | March 26, 2019 at 07:24 AM
Not email, paper mail: Thieves, often at night, use string to lower glue-covered rodent traps or bottles coated with an adhesive down the chute of a sidewalk mailbox...Bruce Schneier From Schneier on Security | March 25, 2019 at 10:39 AM
From the New York Times: Now, a paper published last week in Nature Communications suggests that their chromatophores, previously thought to be mainly pockets of...Bruce Schneier From Schneier on Security | March 22, 2019 at 05:45 PM
GCHQ has put simulators for the Enigma, Typex, and Bombe on the Internet. News article....Bruce Schneier From Schneier on Security | March 22, 2019 at 07:16 AM
The Daily Beast is reporting that First Look Media -- home of The Intercept and Glenn Greenwald -- is shutting down access to the Snowden archives. The Intercept...Bruce Schneier From Schneier on Security | March 21, 2019 at 06:52 AM
This isn't a security story, but it easily could have been. Last Saturday, Zipcar had a system outage: "an outage experienced by a third party telecommunications...Bruce Schneier From Schneier on Security | March 20, 2019 at 01:38 PM
Andrew Odlyzko's new essay is worth reading -- "Cybersecurity is not very important": Abstract: There is a rising tide of security breaches. There is an even faster...Bruce Schneier From Schneier on Security | March 20, 2019 at 07:03 AM
Turns out that the software a bunch of CAs used to generate public-key certificates was flawed: they created random serial numbers with only 63 bits instead of...Bruce Schneier From Schneier on Security | March 18, 2019 at 07:23 AM