From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Today, IBM announced its intention to purchase my company, Resilient Systems. (Yes, the rumors were basically true.) I think this is a great development for Resilient...Bruce Schneier From Schneier on Security | February 29, 2016 at 12:08 PM
Research paper: Gavin J.D. Smith, "Surveillance, Data and Embodiment: On the Work of Being Watched," Body and Society, January 2016. Abstract: Today's bodies are...Bruce Schneier From Schneier on Security | February 29, 2016 at 07:17 AM
Engineers have invented a wave energy converter that works in the same way that squid propel themselves through the water. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | February 26, 2016 at 05:49 PM
New Research: Rebecca Lipman, "Online Privacy and the Invisible Market for Our Data." The paper argues that notice and consent doesn't work, and suggests how is...Bruce Schneier From Schneier on Security | February 26, 2016 at 01:22 PM
Law Professor Karen Levy writes about the rise of surveillance in our most intimate activities -- love, sex, romance -- and how it affects those activities. This...Bruce Schneier From Schneier on Security | February 26, 2016 at 08:33 AM
In the conversation about zero-day vulnerabilities and whether "good" governments should disclose or hoard vulnerabilities, one of the critical variables is independent...Bruce Schneier From Schneier on Security | February 25, 2016 at 02:14 PM
Encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your cell phone conversations from eavesdroppers...Bruce Schneier From Schneier on Security | February 25, 2016 at 07:40 AM
Brian Krebs has a really weird story about the build-in eavesdropping by the Chinese-made Foscam security camera: Imagine buying an internet-enabled surveillance...Bruce Schneier From Schneier on Security | February 24, 2016 at 01:05 PM
Interesting research: Michael Kearns, Aaron Roth, Zhiewi Steven Wu, and Grigory Yaroslavtsev, "Private algorithms for the protected in social network search," PNAS...Bruce Schneier From Schneier on Security | February 24, 2016 at 07:05 AM
For the past month or so, Forbes has been blocking browsers with ad blockers. Today, I tried to access a Wired article and the site blocked me for the same reason...Bruce Schneier From Schneier on Security | February 23, 2016 at 01:18 PM
Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware...Bruce Schneier From Schneier on Security | February 23, 2016 at 06:49 AM
Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight...Bruce Schneier From Schneier on Security | February 22, 2016 at 07:58 AM
Fascinating story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 19, 2016 at 05:17 PM
I saw two related stories today. The first is about high-denomination currency. The EU is considering dropping its 500-euro note, on the grounds that only criminals...Bruce Schneier From Schneier on Security | February 19, 2016 at 07:34 AM
It's a teenager: British police have arrested a teenager who allegedly was behind a series of audacious -- and, for senior U.S. national security officials, embarrassing...Bruce Schneier From Schneier on Security | February 18, 2016 at 07:02 AM
A judge has ordered that Apple bypass iPhone security in order for the FBI to attempt a brute-force password attack on an iPhone 5c used by one of the San Bernardino...Bruce Schneier From Schneier on Security | February 17, 2016 at 03:15 PM
Trust is a complex social phenomenon, captured very poorly by the binary nature of Internet trust systems. This paper proposes a social consensus system of trust...Bruce Schneier From Schneier on Security | February 17, 2016 at 06:18 AM
More psychological research on our reaction to terrorism and mass violence: The researchers collected posts on Twitter made in response to the 2012 shooting attack...Bruce Schneier From Schneier on Security | February 16, 2016 at 07:27 AM