From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Earlier this month, I wrote about a statement by the Five Eyes countries about encryption and back doors. (Short summary: they like them.) One of the weird things...Bruce Schneier From Schneier on Security | October 1, 2018 at 07:22 AM
This is really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 28, 2018 at 05:11 PM
The major tech companies, scared that states like California might impose actual privacy regulations, have now decided that they can better lobby the federal government...Bruce Schneier From Schneier on Security | September 28, 2018 at 02:19 PM
This one is from NIST: "Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others...Bruce Schneier From Schneier on Security | September 27, 2018 at 01:00 PM
Interesting research: In the team's experiments, one WiFi transmitter and one WiFi receiver are behind walls, outside a room in which a number of people are present...Bruce Schneier From Schneier on Security | September 27, 2018 at 08:43 AM
This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital...Bruce Schneier From Schneier on Security | September 25, 2018 at 07:50 AM
If someone has physical access to your shut-down computer, they can probably break the hard-drive's encryption. This is a "cold boot" attack, and one we thought...Bruce Schneier From Schneier on Security | September 24, 2018 at 07:52 AM
On James Island. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 21, 2018 at 05:14 PM
Lots of people are e-mailing me about this new result on the distribution of prime numbers. While interesting, it has nothing to do with cryptography. Cryptographers...Bruce Schneier From Schneier on Security | September 21, 2018 at 03:14 PM
NIST has released a new study concluding that the AES encryption standard has resulted in a $250 billion world-wide economic benefit over the past twenty years....Bruce Schneier From Schneier on Security | September 21, 2018 at 07:37 AM
Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This particular...Bruce Schneier From Schneier on Security | September 20, 2018 at 07:45 AM
Citizen Lab has published a new report about the Pegasus spyware. From a ZDNet article: The malware, known as Pegasus (or Trident), was created by Israeli cyber...Bruce Schneier From Schneier on Security | September 19, 2018 at 06:19 AM
A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of...Bruce Schneier From Schneier on Security | September 17, 2018 at 07:12 AM
Lessons learned. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 14, 2018 at 05:13 PM
It's impossible to know all the details, but my latest book seems to be selling well. Initial reviews have been really positive: Boing Boing, Financial Times, Harris...Bruce Schneier From Schneier on Security | September 14, 2018 at 03:14 PM
Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies...Bruce Schneier From Schneier on Security | September 14, 2018 at 07:15 AM
Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks...Bruce Schneier From Schneier on Security | September 13, 2018 at 10:08 AM
A security vulnerability in Belkin's Wemo Insight "smartplugs" allows hackers to not only take over the plug, but use it as a jumping-off point to attack everything...Bruce Schneier From Schneier on Security | September 12, 2018 at 07:19 AM
This is really interesting research: "BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid": Abstract: We demonstrate that an Internet of Things...Bruce Schneier From Schneier on Security | September 11, 2018 at 07:25 AM