From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
If you call the proper phone extension, you have complete control over the public address system at a Target store....Bruce Schneier From Schneier on Security | October 19, 2015 at 10:49 AM
"Terrifying" squid photos. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 16, 2015 at 05:20 PM
Citizen Lab continues to do excellent work exposing the world's cyber-weapons arms manufacturers. Its latest report attempts to track users of Gamma International's...Bruce Schneier From Schneier on Security | October 16, 2015 at 03:33 PM
The Internet is abuzz with this blog post and paper, speculating that the NSA is breaking the Diffie-Hellman key-exchange protocol in the wild through massive precomputation...Bruce Schneier From Schneier on Security | October 16, 2015 at 07:19 AM
The Obama Administration is not pursuing a law that would force computer and communications manufacturers to add backdoors to their products for law enforcement...Bruce Schneier From Schneier on Security | October 14, 2015 at 10:39 AM
In the 19980s, the Soviet Union bugged the IBM Selectric typewriters in the U.S. Embassy in Moscow. This NSA document discusses how the US discovered the bugs and...Bruce Schneier From Schneier on Security | October 12, 2015 at 09:19 AM
Delicious recipe of squid with cabbage, bean sprouts, and noodles. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | October 8, 2015 at 06:27 PM
The show is about security theater. I am a disembodied head on a scooter. Here's a teaser. Here's the full episode (for pay, but cheap). The scooter idea was a...Bruce Schneier From Schneier on Security | October 8, 2015 at 03:11 PM
There's a new cryptanalysis result against the hash function SHA-1: Abstract: We present in this article a freestart collision example for SHA-1, i.e., a collision...Bruce Schneier From Schneier on Security | October 8, 2015 at 12:44 PM
There's a lot of information, including the ability to get even more information....Bruce Schneier From Schneier on Security | October 8, 2015 at 07:22 AM
The European Court of Justice ruled that sending personal data to the US violates their right to privacy: The ruling, by the European Court of Justice, said the...Bruce Schneier From Schneier on Security | October 7, 2015 at 08:27 AM
ID checks were a common response to the terrorist attacks of 9/11, but they'll soon be obsolete. You won't have to show your ID, because you'll be identified automatically...Bruce Schneier From Schneier on Security | October 5, 2015 at 07:11 AM
The Hawaiian Bobtail Squid deposits bacteria on its eggs to keep them safe. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | October 2, 2015 at 05:11 PM
Former Raytheon chief scientist Bill Swanson has joined our board of directors. For those who don't know, Resilient Systems is my company. I'm the CTO, and we sell...Bruce Schneier From Schneier on Security | October 2, 2015 at 03:06 PM
The news from the Office of Personnel Management hack keeps getting worse. In addition to the personal records of over 20 million US government employees, we've...Bruce Schneier From Schneier on Security | October 2, 2015 at 07:35 AM