From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's a beautiful picture of a tiny squid in this New York Times article on bioluminescence -- and a dramatic one of a vampire squid. As usual, you can also use...Bruce Schneier From Schneier on Security | September 1, 2017 at 05:28 PM
Kaspersky Labs released a highly sophisticated set of hacking tools from Russia called WhiteBear. From February to September 2016, WhiteBear activity was narrowly...Bruce Schneier From Schneier on Security | September 1, 2017 at 07:39 AM
This should come as no surprise: Alas, our findings suggest that secure communications haven't yet attracted mass adoption among journalists. We looked at 2,515...Bruce Schneier From Schneier on Security | August 31, 2017 at 07:52 AM
New paper: "Policy measures and cyber insurance: a framework," by Daniel Woods and Andrew Simpson, Journal of Cyber Policy, 2017. Abstract: The role of the insurance...Bruce Schneier From Schneier on Security | August 30, 2017 at 02:22 PM
New research: "Verified Correctness and Security of mbedTLS HMAC-DRBG," by Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, and...Bruce Schneier From Schneier on Security | August 30, 2017 at 07:37 AM
Interesting post-Snowden reading, just declassified. (U) External Communication will address at least one of "fresh look" narratives: (U) NSA does not access everything...Bruce Schneier From Schneier on Security | August 30, 2017 at 07:15 AM
Ross Anderson gave a talk on the history of the Crypto Wars in the UK. I am intimately familiar with the US story, but didn't know as much about Britain's verson...Bruce Schneier From Schneier on Security | August 29, 2017 at 07:38 AM
Researchers demonstrated a really clever hack: they hid malware in a replacement smart phone screen. The idea is that you would naively bring your smart phone in...Bruce Schneier From Schneier on Security | August 28, 2017 at 07:22 AM
Paleontologists have discovered a prehistoric toothless dolphin that fed by vacuuming up squid: There actually are modern odontocetes that don't really use their...Bruce Schneier From Schneier on Security | August 25, 2017 at 05:48 PM
This very interesting essay looks at the future of military robotics and finds many analogs in nature: Imagine a low-cost drone with the range of a Canada goose...Bruce Schneier From Schneier on Security | August 25, 2017 at 07:34 AM
Seems to be incompetence rather than malice, but a good example of the dangers of blindly trusting the cloud....Bruce Schneier From Schneier on Security | August 24, 2017 at 07:30 AM
Shonin is a personal bodycam up on Kickstarter. There are a lot of complicated issues surrounding bodycams -- for example, it's obvious that police bodycams reduce...Bruce Schneier From Schneier on Security | August 23, 2017 at 07:41 AM
Eddie Tipton, a programmer for the Multi-State Lottery Association, secretly installed software that allowed him to predict jackpots. What's surprising to me is...Bruce Schneier From Schneier on Security | August 22, 2017 at 07:40 AM
A new feature in Apple's new iPhone operating system -- iOS 11 -- will allow users to quickly disable Touch ID. A new setting, designed to automate emergency services...Bruce Schneier From Schneier on Security | August 21, 2017 at 07:57 AM
Watch a brittle star catch a squid, and then lose it to another brittle star. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | August 18, 2017 at 05:27 PM
I have successfully gotten the fake LinkedIn account in my name deleted. To prevent someone from doing this again, I signed up for LinkedIn. This is my first --...Bruce Schneier From Schneier on Security | August 18, 2017 at 03:14 PM
There is an unpatchable vulnerability that affects most modern cars. It's buried in the Controller Area Network (CAN): Researchers say this flaw is not a vulnerability...Bruce Schneier From Schneier on Security | August 18, 2017 at 07:40 AM
The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus...Bruce Schneier From Schneier on Security | August 17, 2017 at 07:12 AM
One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets -- or misinterprets -- in...Bruce Schneier From Schneier on Security | August 15, 2017 at 07:00 AM
This video purports to be a bank robbery in Kiev. He first threatens a teller, who basically ignores him because she's behind bullet-proof glass. But then the robber...Bruce Schneier From Schneier on Security | August 14, 2017 at 07:03 AM