From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Two former Kaspersky employees have accused the company of faking malware to harm rival antivirus products. They would falsely classify legitimate files as malicious...Bruce Schneier From Schneier on Security | August 18, 2015 at 03:35 PM
I've previously written about mail cover -- the practice of recording the data on mail envelopes. Sai has been covering the issue in more detail, and recently received...Bruce Schneier From Schneier on Security | August 18, 2015 at 07:48 AM
One of the books confiscated from Chelsea Manning was a copy of Data and Goliath....Bruce Schneier From Schneier on Security | August 17, 2015 at 05:24 PM
Oracle's CSO Mary Ann Davidson wrote a blog post ranting against security experts finding vulnerabilities in her company's products. The blog post has been taken...Bruce Schneier From Schneier on Security | August 17, 2015 at 07:45 AM
There's a new article, published jointly by The New York Times and ProPublica, aboutNSA's longstanding relationship with AT&T. It's based on the Snowden documents...Bruce Schneier From Schneier on Security | August 15, 2015 at 01:44 PM
I think it's a very pretty creature with some impressive adaptations. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | August 15, 2015 at 01:32 PM
Good operational security is hard, and often uses manual technologies: Investigators described how Messina Denaro, 53, disdains telecommunications and relies on...Bruce Schneier From Schneier on Security | August 13, 2015 at 07:33 AM
Prosecutors from New York, London, Paris, and Madrid wrote an op-ed in yesterday's New York Times in favor of backdoors in cell phone encryption. There are a number...Bruce Schneier From Schneier on Security | August 12, 2015 at 03:18 PM
This FBI alert is interesting: (U//FOUO) In May 2015, the wife of a US military member was approached in front of her home by two Middle-Eastern males. The men...Bruce Schneier From Schneier on Security | August 12, 2015 at 06:49 AM
Local police are trying to convince drug dealers to turn each other in by pointing out that it reduces competition. It's a comical tactic with serious results:...Bruce Schneier From Schneier on Security | August 11, 2015 at 07:41 AM
Interesting research detecting betrayal in the game of Diplomacy by analyzing interplayer messages. One harbinger was a shift in politeness. Players who were excessively...Bruce Schneier From Schneier on Security | August 10, 2015 at 04:32 PM
Divers discover a large mass of Ommastrephes bartramii eggs: Earlier this month, a team of divers swimming off the coast of Turkey discovered something unexpected...Bruce Schneier From Schneier on Security | August 7, 2015 at 05:58 PM
Before Edward Snowden told us so much about NSA surveillance, before Mark Klein told us a little, even before 9/11, Duncan Campbell broke the story of ECHELON....Bruce Schneier From Schneier on Security | August 7, 2015 at 08:00 AM
Good fictional account of an average computer user and how people understand and view security. Related: "Real World Use Cases for High-Risk Users."...Bruce Schneier From Schneier on Security | August 6, 2015 at 03:26 PM
Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or...Bruce Schneier From Schneier on Security | August 6, 2015 at 07:09 AM
New research can identify a person by reading their thermal signature in complete darkness and then matching it with ordinary photographs. Research paper: Abstract...Bruce Schneier From Schneier on Security | August 5, 2015 at 07:02 AM
A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was...Bruce Schneier From Schneier on Security | August 4, 2015 at 09:24 AM