From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to derive various elements of his life. They did pretty well...Bruce Schneier From Schneier on Security | September 1, 2015 at 07:36 AM
This is interesting research:: Whilst the fridge implements SSL, it FAILS to validate SSL certificates, thereby enabling man-in-the-middle attacks against most...Bruce Schneier From Schneier on Security | August 31, 2015 at 02:56 PM
Beautiful diorama. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | August 28, 2015 at 05:33 PM
James Mickens, for your amusement. A somewhat random sample: My point is that security people need to get their priorities straight. The "threat model" section...Bruce Schneier From Schneier on Security | August 28, 2015 at 04:58 PM
An unofficial blog post from FTC chief technologist Ashkan Soltani on the virtues of strong end-user device controls....Bruce Schneier From Schneier on Security | August 28, 2015 at 03:36 PM
The German newspaper Zeit is reporting the BfV, Germany's national intelligence agency, (probably) illegally traded data about Germans to the NSA in exchange for...Bruce Schneier From Schneier on Security | August 28, 2015 at 10:23 AM
CitizenLab is reporting on Iranian hacking attempts against activists, which include a real-time man-in-the-middle attack against Google's two-factor authentication...Bruce Schneier From Schneier on Security | August 27, 2015 at 01:36 PM
In the wake of the recent averted mass shooting on the French railroads, officials are realizing that there are just too many potential targets to defend. The sheer...Bruce Schneier From Schneier on Security | August 27, 2015 at 07:57 AM
Interesting: Marte Løge, a 2015 graduate of the Norwegian University of Science and Technology, recently collected and analyzed almost 4,000 ALPs as part of her...Bruce Schneier From Schneier on Security | August 26, 2015 at 07:24 AM
Kansas Senator Pat Roberts wins an award for his movie-plot threat: terrorists attacking the maximum-security federal prison at Ft. Leavenworth: In an Aug. 14 letter...Bruce Schneier From Schneier on Security | August 25, 2015 at 03:19 PM
This research says that data breaches are not getting larger over time. "Hype and Heavy Tails: A Closer Look at Data Breaches," by Benjamin Edwards, Steven Hofmeyr...Bruce Schneier From Schneier on Security | August 25, 2015 at 07:27 AM
Here's an interesting research paper that tries to calculate the differential value of privacy-invasive advertising practices. The researchers used data from a...Bruce Schneier From Schneier on Security | August 24, 2015 at 06:50 AM
Nice and easy Calamari Ripieni recipe, along with general instructions on cooking squid: Tenderizing squid is as simple as pounding it flat -- if you're going to...Bruce Schneier From Schneier on Security | August 21, 2015 at 05:07 PM
Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different...Bruce Schneier From Schneier on Security | August 21, 2015 at 01:36 PM
Interesting: Remember that vulnerability in the SS7 inter-carrier network that lets hackers and spies track your cellphone virtually anywhere in the world? It's...Bruce Schneier From Schneier on Security | August 21, 2015 at 07:47 AM
The US government has admitted that it uses predictive assessments to put people on the no-fly list: In a little-noticed filing before an Oregon federal judge,...Bruce Schneier From Schneier on Security | August 20, 2015 at 07:19 AM
This is serious: Cisco Systems officials are warning customers of a series of attacks that completely hijack critical networking gear by swapping out the valid...Bruce Schneier From Schneier on Security | August 19, 2015 at 01:34 PM
This is interesting: First, it integrates with corporate directories such as Active Directory and social media sites like LinkedIn to map the connections between...Bruce Schneier From Schneier on Security | August 19, 2015 at 08:11 AM