From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Brian Krebs is reporting sophisticated jackpotting attacks against US ATMs. The attacker gains physical access to the ATM, plants malware using specialized electronics...Bruce Schneier From Schneier on Security | February 1, 2018 at 07:23 AM
According to this story (non-paywall English version here), Israeli scientists released some information to the public they shouldn't have. Defense establishment...Bruce Schneier From Schneier on Security | January 31, 2018 at 03:37 PM
For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. We've just lost an important battle...Bruce Schneier From Schneier on Security | January 31, 2018 at 07:06 AM
Local residents are opposing adding an elevator to a subway station because terrorists might use it to detonate a bomb. No, really. There's no actual threat analysis...Bruce Schneier From Schneier on Security | January 30, 2018 at 07:26 AM
In November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app. Over this weekend, someone...Bruce Schneier From Schneier on Security | January 29, 2018 at 03:17 PM
It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to...Bruce Schneier From Schneier on Security | January 29, 2018 at 07:18 AM
The mating and death characteristics of some squid are fascinating. Research paper. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | January 26, 2018 at 05:23 PM
On January 3, the world learned about a series of major security vulnerabilities in modern microprocessors. Called Spectre and Meltdown, these vulnerabilities were...Bruce Schneier From Schneier on Security | January 26, 2018 at 07:12 AM
A new vulnerability in WhatsApp has been discovered: ...the researchers unearthed far more significant gaps in WhatsApp's security: They say that anyone who controls...Bruce Schneier From Schneier on Security | January 25, 2018 at 07:47 AM
This is clever: Researchers at Ben Gurion University in Beer Sheva, Israel have built a proof-of-concept system for counter-surveillance against spy drones that...Bruce Schneier From Schneier on Security | January 24, 2018 at 06:28 AM
This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted...Bruce Schneier From Schneier on Security | January 23, 2018 at 07:41 AM
Kaspersky Labs is reporting on a new piece of sophisticated malware: We observed many web landing pages that mimic the sites of mobile operators and which are used...Bruce Schneier From Schneier on Security | January 22, 2018 at 01:06 PM
The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients...Bruce Schneier From Schneier on Security | January 22, 2018 at 07:38 AM
The New Zealand home of the colossal squid exhibit is behind renovated. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | January 19, 2018 at 05:48 PM
Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. Abstract: This report assesses the impact disclosure...Bruce Schneier From Schneier on Security | January 19, 2018 at 07:06 AM
Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society...Bruce Schneier From Schneier on Security | January 17, 2018 at 07:23 AM
Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets....Bruce Schneier From Schneier on Security | January 16, 2018 at 07:58 AM
No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but...Bruce Schneier From Schneier on Security | January 15, 2018 at 07:43 AM
This seems to be a trend. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | January 12, 2018 at 05:12 PM