From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...Bruce Schneier From Schneier on Security | July 10, 2014 at 07:36 AM
The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...Bruce Schneier From Schneier on Security | July 9, 2014 at 01:55 PM
Man-in-the-middle attack against a Brazilian payment system: Brazil has an extremely active and talented cybercrime underground, and increasingly Brazilian organized...Bruce Schneier From Schneier on Security | July 9, 2014 at 08:30 AM
Pickpocket tricks explained by neuroscience. So while sleight of hand helps, it's as much about capturing all of somebody's attention with other movements. Street...Bruce Schneier From Schneier on Security | July 8, 2014 at 07:53 AM
Last week, the German government arrested someone and charged him with spying for the US. Buried in one of the stories was a little bit of tradecraft. The US game...Bruce Schneier From Schneier on Security | July 7, 2014 at 02:56 PM
The latest story from the Snowden documents analyzes a large cache of intercepted conversations -- actual operational data -- and concludes that 90% of the individuals...Bruce Schneier From Schneier on Security | July 7, 2014 at 06:58 AM
Cute design. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 4, 2014 at 05:13 PM
I don't care about the case, but look at this: "Among the details police have released is that Harris and his wife, Leanna, told them they conducted Internet searches...Bruce Schneier From Schneier on Security | July 4, 2014 at 07:55 AM
Jake Appelbaum et. al, are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites....Bruce Schneier From Schneier on Security | July 3, 2014 at 12:57 PM
Goldman Sachs is going to court to demand that Google retroactively delete an e-mail it accidentally sent. The breach occurred on June 23 and included "highly confidential...Bruce Schneier From Schneier on Security | July 3, 2014 at 08:51 AM
New research paper on how the NSA can evade legal prohibitions against collecting Internet data and metadata on Americans by forcing domestic traffic to leave and...Bruce Schneier From Schneier on Security | July 1, 2014 at 04:28 PM
I have always liked the "WTF, Evolution?" blog. Consistently funny, but no squid. But now they have a bit on the vampire squid. As usual, you can also use this...Bruce Schneier From Schneier on Security | June 27, 2014 at 05:55 PM
Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities...Bruce Schneier From Schneier on Security | June 26, 2014 at 07:37 AM
Coming soon to a protest near you: drones that fire pepper spray bullets. Desert Wolf's website states that its Skunk octacopter drone is fitted with four high-capacity...Bruce Schneier From Schneier on Security | June 25, 2014 at 03:49 PM
New York City officials anonymized license plate data by hashing the individual plate numbers with MD5. (I know, they shouldn't have used MD5, but ignore that for...Bruce Schneier From Schneier on Security | June 25, 2014 at 07:36 AM
Ex-NSA director Keith Alexander has his own consulting company: IronNet Cybersecurity Inc. His advice does not come cheap: Alexander offered to provide advice to...Bruce Schneier From Schneier on Security | June 24, 2014 at 03:56 PM
The second Quadrennial Homeland Security Review has been published by the Department of Homeland Security. At 100+ pages, I'm not going to be reading it, but I...Bruce Schneier From Schneier on Security | June 24, 2014 at 09:09 AM
Interesting paper: M. Bellare, K. Paterson, and P. Rogaway, "Security of Symmetric Encryption against Mass Surveillance." Abstract: Motivated by revelations concerning...Bruce Schneier From Schneier on Security | June 24, 2014 at 08:55 AM