From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Squid sighting in this Christmas cartoon. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And...Bruce Schneier From Schneier on Security | December 25, 2015 at 04:00 PM
Earlier this month, a Las Vegas taco shop was robbed in the middle of the night. The restaurant took the surveillance-video footage and turned it into a combination...Bruce Schneier From Schneier on Security | December 24, 2015 at 02:24 PM
This weird story describes a "porn dog" that is trained to find hidden hard drives. It's used in child porn investigations. I suppose it's reasonable that computer...Bruce Schneier From Schneier on Security | December 24, 2015 at 09:18 AM
On Thursday, a Brazilian judge ordered the text messaging service WhatsApp shut down for 48 hours. It was a monumental action. WhatsApp is the most popular app...Bruce Schneier From Schneier on Security | December 23, 2015 at 07:48 AM
Two things to read: "Wanting It Bad Enough Won't Make It Work: Why Adding Backdoors and Weakening Encryption Threatens the Internet," by Meredith Whittaker and...Bruce Schneier From Schneier on Security | December 22, 2015 at 07:34 AM
This interesting article by medieval historian Amanda Power traces our culture's relationship with the concept of mass surveillance from the medieval characterization...Bruce Schneier From Schneier on Security | December 21, 2015 at 02:09 PM
Juniper has warned about a malicious back door in their firewalls that automatically decrypts VPN traffic. It's been there for years. Hopefully details are forthcoming...Bruce Schneier From Schneier on Security | December 21, 2015 at 07:52 AM
Watch this video of gentoo penguins fighting over a large squid. This underwater brawl was captured on a video camera taped to the back of the second penguin, revealing...Bruce Schneier From Schneier on Security | December 18, 2015 at 05:11 PM
If you like puzzles, GCHQ has one for you. Just don't let it distract you from fighting the UK legislation giving the GCHQ new surveillance powers....Bruce Schneier From Schneier on Security | December 18, 2015 at 01:29 PM
The Intercept has "a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies."...Bruce Schneier From Schneier on Security | December 17, 2015 at 01:06 PM
This should come as no surprise: users often compromise their own security by making mistakes setting up and using their encryption apps. Paper: "On the Security...Bruce Schneier From Schneier on Security | December 17, 2015 at 07:46 AM
Yesterday, the city of Los Angeles closed all of its schools -- over 1,000 schools -- because of a bomb threat. It was a hoax. LA officials defended the move, with...Bruce Schneier From Schneier on Security | December 16, 2015 at 07:28 AM
Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...Bruce Schneier From Schneier on Security | December 15, 2015 at 01:19 AM
The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....Bruce Schneier From Schneier on Security | December 14, 2015 at 06:46 AM
Neat: While the Dana octopus squid may lack a squid's trademark trailing tentacles, it makes up for them in spectacular lighting equipment, with two of its muscular...Bruce Schneier From Schneier on Security | December 11, 2015 at 05:02 PM
I'll be participating in an end-of-year trends and predictions webinar on Thursday, December 17, at 1:00 PM EST. Join me here. In other news, Resilient has joined...Bruce Schneier From Schneier on Security | December 11, 2015 at 03:56 PM
A Florida woman drove away after an accident, but her car automatically reported it anyway. She was arrested....Bruce Schneier From Schneier on Security | December 11, 2015 at 07:48 AM
Interesting research: "Identifying patterns in informal sources of security information," by Emilee Rader and Rick Wash, Journal of Cybersecurity, 1 Dec 2015. Abstract...Bruce Schneier From Schneier on Security | December 10, 2015 at 07:54 AM