From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good essay on the inherent vulnerabilities in the cell phone standards and the market barriers to fixing them. So far, industry and policymakers have largely dragged...Bruce Schneier From Schneier on Security | January 10, 2019 at 06:52 AM
The EU is offering "bug bounties on Free Software projects that the EU institutions rely on." Slashdot thread....Bruce Schneier From Schneier on Security | January 9, 2019 at 08:05 AM
No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how, or when. While the literature generally...Bruce Schneier From Schneier on Security | January 8, 2019 at 07:13 AM
This is clever: How the attack works: Attacker added tens of malicious servers to the Electrum wallet network. Users of legitimate Electrum wallets initiate a Bitcoin...Bruce Schneier From Schneier on Security | January 7, 2019 at 07:13 AM
It's growing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | January 4, 2019 at 05:16 PM
Good article on using long-range familial searching -- basically, DNA matching of distant relatives -- as a police forensics tool....Bruce Schneier From Schneier on Security | January 2, 2019 at 10:29 AM
Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks...Bruce Schneier From Schneier on Security | December 31, 2018 at 06:57 AM
This is almost over: From 1 December 2018 -- 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will...Bruce Schneier From Schneier on Security | December 28, 2018 at 05:04 PM
Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are: HADQSSFC98WCQ...Bruce Schneier From Schneier on Security | December 28, 2018 at 01:11 PM
This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large...Bruce Schneier From Schneier on Security | December 28, 2018 at 07:43 AM
The New York Times is reporting on the security measures people are using to protect nativity displays....Bruce Schneier From Schneier on Security | December 27, 2018 at 07:25 AM
Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses...Bruce Schneier From Schneier on Security | December 26, 2018 at 07:27 AM
Stealing packages from unattended porches is a rapidly rising crime, as more of us order more things by mail. One person hid a glitter bomb and a video recorder...Bruce Schneier From Schneier on Security | December 25, 2018 at 07:13 AM
Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital...Bruce Schneier From Schneier on Security | December 24, 2018 at 07:25 AM
North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | December 21, 2018 at 05:14 PM
Someone is flying a drone over Gatwick Airport in order to disrupt service: Chris Woodroofe, Gatwick's chief operating officer, said on Thursday afternoon there...Bruce Schneier From Schneier on Security | December 21, 2018 at 07:24 AM
Fascinating article about the many ways Amazon Marketplace sellers sabotage each other and defraud customers. The opening example: framing a seller for false advertising...Bruce Schneier From Schneier on Security | December 20, 2018 at 07:21 AM
The US House of Representatives Committee on Oversight and Government Reform has just released a comprehensive report on the 2017 Equifax hack. It's a great piece...Bruce Schneier From Schneier on Security | December 19, 2018 at 07:00 AM
Peter Swire proposes a a pedagogic framework for teaching cybersecurity policy. Specifically, he makes real the old joke about adding levels to the OSI networking...Bruce Schneier From Schneier on Security | December 18, 2018 at 07:31 AM