From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called "Speculative Store Bypass." Like the others, the fix...Bruce Schneier From Schneier on Security | May 22, 2018 at 10:38 AM
The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate...Bruce Schneier From Schneier on Security | May 21, 2018 at 10:54 AM
Flying squid are real. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | May 18, 2018 at 05:20 PM
Someone changed the address of UPS corporate headquarters to his own apartment in Chicago. The company discovered it three months later. The problem, of course,...Bruce Schneier From Schneier on Security | May 18, 2018 at 07:20 AM
The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea....Bruce Schneier From Schneier on Security | May 17, 2018 at 07:23 AM
The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service...Bruce Schneier From Schneier on Security | May 16, 2018 at 07:16 AM
Researchers have demonstrated the ability to send inaudible commands to voice assistants like Alexa, Siri, and Google Assistant. Over the last two years, researchers...Bruce Schneier From Schneier on Security | May 15, 2018 at 07:13 AM
A new PGP vulnerability was announced today. Basically, the vulnerability makes use of the fact that modern e-mail programs allow for embedded HTML objects. Essentially...Bruce Schneier From Schneier on Security | May 14, 2018 at 02:36 PM
EFF is reporting that a critical vulnerability has been discovered in PGP and S/MIME. No details have been published yet, but one of the researchers wrote: We'll...Bruce Schneier From Schneier on Security | May 14, 2018 at 10:33 AM
Squids used to have shells. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | May 11, 2018 at 05:17 PM
New research: "Leaving on a jet plane: the trade in fraudulently obtained airline tickets:" Abstract: Every day, hundreds of people fly on airline tickets that...Bruce Schneier From Schneier on Security | May 11, 2018 at 07:24 AM
Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their...Bruce Schneier From Schneier on Security | May 10, 2018 at 10:11 AM
This article says that the Virginia Beach police are looking to buy encrypted radios. Virginia Beach police believe encryption will prevent criminals from listening...Bruce Schneier From Schneier on Security | May 9, 2018 at 10:42 AM
This survey and report is not surprising: The survey of nearly forty Republican and Democratic campaign operatives, administered through November and December 2017...Bruce Schneier From Schneier on Security | May 8, 2018 at 10:07 AM
Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints...Bruce Schneier From Schneier on Security | May 7, 2018 at 10:32 AM
The next major war will be super weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...Bruce Schneier From Schneier on Security | May 4, 2018 at 05:18 PM
Micah Lee ran a two-year experiment designed to detect whether or not his laptop was ever tampered with. The results are inconclusive, but demonstrate how difficult...Bruce Schneier From Schneier on Security | May 4, 2018 at 07:19 AM
Interesting symmetric cipher: LC4: Abstract: ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed...Bruce Schneier From Schneier on Security | May 3, 2018 at 07:42 AM
This is interesting: Creating these defenses is the goal of NIST's lightweight cryptography initiative, which aims to develop cryptographic algorithm standards...Bruce Schneier From Schneier on Security | May 2, 2018 at 07:40 AM
Researchers at Princeton University have released IoT Inspector, a tool that analyzes the security and privacy of IoT devices by examining the data they send across...Bruce Schneier From Schneier on Security | May 1, 2018 at 07:32 AM