From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A group of researchers have reverse-engineered the NSA's retro reflectors, and has recreated them using software-defined radio (SDR): An SDR Ossmann designed and...Bruce Schneier From Schneier on Security | June 23, 2014 at 01:10 PM
Quick and easy recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 20, 2014 at 06:00 PM
At the beginning of the year, I announced that I'd joined Co3 Systems as its CTO. Co3 Systems makes coordination software -- what I hear called workflow management...Bruce Schneier From Schneier on Security | June 20, 2014 at 03:19 PM
Two new stories: one from Der Spiegel in Germany (also reported in the Intercept) and the other from Dagbladet in Denmark (again, also reported in the Intercept)...Bruce Schneier From Schneier on Security | June 20, 2014 at 10:46 AM
Research paper: "It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice, by Nicolas Christin, Serge Egelman, Timothy...Bruce Schneier From Schneier on Security | June 19, 2014 at 07:58 AM
This is a bizarre story of an almost-happened $10 million scam. It reads like an obviously phony Nigerian 419 scam, but it actually fooled what seem to be smart...Bruce Schneier From Schneier on Security | June 17, 2014 at 03:54 PM
Here are two articles about how effectively the Islamic State of Iraq and Syria (ISIS) -- the militant group that has just taken over half of Iraq -- is using social...Bruce Schneier From Schneier on Security | June 17, 2014 at 11:22 AM
Good essay on the current state of cyberinsurance. So where does that leave the growing cyber insurance industry as it tries to figure out what losses it should...Bruce Schneier From Schneier on Security | June 16, 2014 at 02:56 PM
Here's a way to plant false evidence -- call records, locations, etc -- on your smart phone. I have no idea how good this will be. Presumably it will be an arms...Bruce Schneier From Schneier on Security | June 16, 2014 at 08:56 AM
This is not good news. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 13, 2014 at 05:59 PM
On April 1, I announced the Seventh Mostly Annual Movie-Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous...Bruce Schneier From Schneier on Security | June 13, 2014 at 07:12 AM
So far they're resisting. Evernote and Deezer are also suffering attacks. I haven't seen anything linking the three different victims, and the other two have not...Bruce Schneier From Schneier on Security | June 11, 2014 at 08:31 AM
We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from...Bruce Schneier From Schneier on Security | June 10, 2014 at 09:54 AM
I'm at SHB 2014: the Seventh Annual Interdisciplinary Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various...Bruce Schneier From Schneier on Security | June 9, 2014 at 05:53 AM
Rhymes with Orange. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 6, 2014 at 05:39 PM
Last June, the Guardian published a story about GCHQ tapping fiber-optic Internet cables around the globe, part of a program codenamed TEMPURA. One of the facts...Bruce Schneier From Schneier on Security | June 5, 2014 at 05:58 PM