From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....Bruce Schneier From Schneier on Security | September 14, 2017 at 07:17 AM
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got...Bruce Schneier From Schneier on Security | September 13, 2017 at 01:49 PM
Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear...Bruce Schneier From Schneier on Security | September 13, 2017 at 07:03 AM
A Raspberry Pi is a tiny computer designed for markers and all sorts of Internet-of-Things types of projects. Make magazine has an article about securing it. Reading...Bruce Schneier From Schneier on Security | September 12, 2017 at 07:12 AM
Andrew "bunnie" Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even...Bruce Schneier From Schneier on Security | September 11, 2017 at 07:12 AM
It's Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 8, 2017 at 05:11 PM
The ShadowBrokers released the manual for UNITEDRAKE, a sophisticated NSA Trojan that targets Windows machines: Able to compromise Windows PCs running on XP, Windows...Bruce Schneier From Schneier on Security | September 8, 2017 at 07:54 AM
Interesting research from Nature Human Behaviour: "The devoted actor's will to fight and the spiritual dimension of human conflict": Abstract: Frontline investigations...Bruce Schneier From Schneier on Security | September 7, 2017 at 07:05 AM
They're actually Arris routers, sold or given away by AT&T. There are several security vulnerabilities, some of them very serious. They can be fixed, but because...Bruce Schneier From Schneier on Security | September 6, 2017 at 07:55 AM
We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability...Bruce Schneier From Schneier on Security | September 5, 2017 at 04:23 PM
Research paper: "Automated Crowdturfing Attacks and Defenses in Online Review Systems." Abstract: Malicious crowdsourcing forums are gaining traction as sources...Bruce Schneier From Schneier on Security | September 4, 2017 at 08:08 AM
There's a beautiful picture of a tiny squid in this New York Times article on bioluminescence -- and a dramatic one of a vampire squid. As usual, you can also use...Bruce Schneier From Schneier on Security | September 1, 2017 at 05:28 PM
Kaspersky Labs released a highly sophisticated set of hacking tools from Russia called WhiteBear. From February to September 2016, WhiteBear activity was narrowly...Bruce Schneier From Schneier on Security | September 1, 2017 at 07:39 AM
This should come as no surprise: Alas, our findings suggest that secure communications haven't yet attracted mass adoption among journalists. We looked at 2,515...Bruce Schneier From Schneier on Security | August 31, 2017 at 07:52 AM
New paper: "Policy measures and cyber insurance: a framework," by Daniel Woods and Andrew Simpson, Journal of Cyber Policy, 2017. Abstract: The role of the insurance...Bruce Schneier From Schneier on Security | August 30, 2017 at 02:22 PM
New research: "Verified Correctness and Security of mbedTLS HMAC-DRBG," by Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, and...Bruce Schneier From Schneier on Security | August 30, 2017 at 07:37 AM
Interesting post-Snowden reading, just declassified. (U) External Communication will address at least one of "fresh look" narratives: (U) NSA does not access everything...Bruce Schneier From Schneier on Security | August 30, 2017 at 07:15 AM
Ross Anderson gave a talk on the history of the Crypto Wars in the UK. I am intimately familiar with the US story, but didn't know as much about Britain's verson...Bruce Schneier From Schneier on Security | August 29, 2017 at 07:38 AM
Researchers demonstrated a really clever hack: they hid malware in a replacement smart phone screen. The idea is that you would naively bring your smart phone in...Bruce Schneier From Schneier on Security | August 28, 2017 at 07:22 AM
Paleontologists have discovered a prehistoric toothless dolphin that fed by vacuuming up squid: There actually are modern odontocetes that don't really use their...Bruce Schneier From Schneier on Security | August 25, 2017 at 05:48 PM