From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail...Bruce Schneier From Schneier on Security | April 9, 2018 at 07:30 AM
This is interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | April 6, 2018 at 04:59 PM
This is a really interesting research result. This paper proves that two parties can create a secure communications cannel using a communications system with a...Bruce Schneier From Schneier on Security | April 4, 2018 at 09:03 AM
The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a...Bruce Schneier From Schneier on Security | April 3, 2018 at 07:22 AM
Rising sea temperatures is causing market squid to move north into Alaskan waters. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | March 30, 2018 at 05:17 PM
It's routine for US police to unlock iPhones with the fingerprints of dead people. It seems only to work with recently dead people....Bruce Schneier From Schneier on Security | March 30, 2018 at 07:11 AM
In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data...Bruce Schneier From Schneier on Security | March 29, 2018 at 04:50 PM
When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction...Bruce Schneier From Schneier on Security | March 29, 2018 at 07:23 AM
Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post....Bruce Schneier From Schneier on Security | March 28, 2018 at 03:25 PM
Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison"...Bruce Schneier From Schneier on Security | March 28, 2018 at 07:30 AM
Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post....Bruce Schneier From Schneier on Security | March 27, 2018 at 10:35 AM
Interesting research into undetectably adding backdoors into computer chips during manufacture: "Stealthy dopant-level hardware Trojans: extended version," also...Bruce Schneier From Schneier on Security | March 26, 2018 at 10:26 AM
An interesting hunting strategy: Off of northern Spain, giant squid often feed on schools of fish called blue whiting. The schools swim 400 meters or less below...Bruce Schneier From Schneier on Security | March 23, 2018 at 05:06 PM
Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book...Bruce Schneier From Schneier on Security | March 23, 2018 at 03:21 PM
Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know...Bruce Schneier From Schneier on Security | March 23, 2018 at 07:28 AM
Interesting paper "A first look at browser-based cryptojacking": Abstract: In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies...Bruce Schneier From Schneier on Security | March 21, 2018 at 07:27 AM
Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper...Bruce Schneier From Schneier on Security | March 19, 2018 at 07:27 AM