From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last month ago I blogged aboutsecurity researcher Chris Roberts being detained by the FBI after tweeting about avionics security while on a United flight: But to...Bruce Schneier From Schneier on Security | May 19, 2015 at 09:00 AM
NASA is funding a study for a squid rover that could explore Europa's oceans. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | May 15, 2015 at 05:08 PM
Interesting: Franzosa and colleagues used publicly available microbiome data produced through the Human Microbiome Project (HMP), which surveyed microbes in the...Bruce Schneier From Schneier on Security | May 15, 2015 at 07:20 AM
On April 1, I announced the Eighth Movie Plot Threat Contest: demonstrate the evils of encryption. Not a whole lot of good submissions this year. Possibly this...Bruce Schneier From Schneier on Security | May 15, 2015 at 12:26 AM
Admiral Mike Rogers gave the keynote address at the Joint Service Academy Cyber Security Summit today at West Point. He started by explaining the four tenets of...Bruce Schneier From Schneier on Security | May 14, 2015 at 02:12 PM
The city of Paradise Valley, AZ, is hiding license plate scanners in fake cactus plants....Bruce Schneier From Schneier on Security | May 14, 2015 at 07:18 AM
This 1947 document describes a German machine to cryptanalyze the American M-209 mechanical encryption machine. I can't figure out anything about how it works.....Bruce Schneier From Schneier on Security | May 13, 2015 at 12:05 PM
Anyone can design a cipher that he himself cannot break. This is why you should uniformly distrust amateur cryptography, and why you should only use published algorithms...Bruce Schneier From Schneier on Security | May 12, 2015 at 06:46 AM
Ross Anderson summarizes a meeting in Princeton where Edward Snowden was "present." Third, the leaks give us a clear view of an intelligence analyst's workflow....Bruce Schneier From Schneier on Security | May 11, 2015 at 07:26 AM
Squid chair. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 8, 2015 at 05:04 PM
It helps if you own the banks: The report said Shor and his associates worked together in 2012 to buy a controlling stake in three Moldovan banks and then gradually...Bruce Schneier From Schneier on Security | May 8, 2015 at 07:13 AM
Interesting research: We identified three types of scams happening on Jiayuan. The first one involves advertising of escort services or illicit goods, and is very...Bruce Schneier From Schneier on Security | May 7, 2015 at 01:30 PM
Matthew Cole explains how the Italian police figured out how the CIA kidnapped Abu Omar in Milan. Interesting use of cell phone metadata, showing how valuable it...Bruce Schneier From Schneier on Security | May 6, 2015 at 09:35 PM
In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...Bruce Schneier From Schneier on Security | May 6, 2015 at 08:09 AM
Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...Bruce Schneier From Schneier on Security | May 5, 2015 at 07:59 AM
Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...Bruce Schneier From Schneier on Security | May 4, 2015 at 07:17 AM