From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This makes a lot of sense.
Viviane Reding dismissed recent fines for Google as "pocket money" and said the firm would have had to pay $1bn under her plans for...schneier From Schneier on Security | January 28, 2014 at 07:47 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SPARROW II
(TS//SI//REL) An embedded computer system running BLINDDATE tools...schneier From Schneier on Security | January 27, 2014 at 09:06 PM
Microsoft is trying to stop supporting Windows XP. The problem is that a majority of ATMs still use that OS. And once Microsoft stops issuing security updates...schneier From Schneier on Security | January 27, 2014 at 07:32 AM
It's big: 13 feet long.
The fisherman was stunned to discover the giant squid trapped in his net, having been caught at a depth of around 70m, about two-thirds...schneier From Schneier on Security | January 24, 2014 at 05:15 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
PHOTOANGLO
(TS//SI//REL TO USA,FVEY) PHOTOANGLO is a joint NSA/GCHQ project...schneier From Schneier on Security | January 24, 2014 at 03:09 PM
I'm sure this is a pirated copy.
Looking at it, it's amazing how long ago twenty years was.schneier From Schneier on Security | January 24, 2014 at 01:43 PM
This is an interesting way to characterizing income inequality as a security issue:
…growing inequality menaces vigorous societies. It is a proxy for how effectively...schneier From Schneier on Security | January 24, 2014 at 07:51 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTWATCH
(TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...schneier From Schneier on Security | January 23, 2014 at 03:39 PM
Tim Hartford talks about consumer manipulation:
Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...schneier From Schneier on Security | January 23, 2014 at 08:03 AM
Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTSTAND
(TS//SI//REL) An active 802.11 wireless exploitation and injection...schneier From Schneier on Security | January 22, 2014 at 03:15 PM
Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...schneier From Schneier on Security | January 22, 2014 at 01:19 PM
Two reports have recently been published questioning the efficacy of the NSA's bulk-collection programs. The first one is from the left-leaning New American Foundation...schneier From Schneier on Security | January 22, 2014 at 07:41 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
LOUDAUTO
(TS//SI//REL TO USA,FVEY) Audio-based RF retro-reflector. Provides...schneier From Schneier on Security | January 21, 2014 at 03:11 PM
This is not a good development:
To make matters worse, ownership of a Chrome extension can be transferred to another party, and users are never informed when an...schneier From Schneier on Security | January 21, 2014 at 07:33 AM
Today's device -- this one isn't an implant -- from the NSA's Tailored Access Operations (TAO) group implant catalog:
CTX4000
(TS//SI//REL TO USA,FVEY) The CTX4000...schneier From Schneier on Security | January 20, 2014 at 03:20 PM
This is new:
The NTP method first began to appear late last year. To bring down a server such as one running "League of Legends," the attackers trick NTP servers...schneier From Schneier on Security | January 20, 2014 at 07:18 AM
Interesting research:
Cephalopods possess a sophisticated array of mechanisms to achieve camouflage in dynamic underwater environments. While active mechanisms...schneier From Schneier on Security | January 17, 2014 at 05:44 PM
There's a new piece of ransomware out there, PowerLocker (also called PrisonLocker), that uses Blowfish:
PowerLocker could prove an even more potent threat because...schneier From Schneier on Security | January 17, 2014 at 03:57 PM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
STUCCOMONTANA
(TS//SI//REL) STUCCOMONTANA provides persistence for DNThere...schneier From Schneier on Security | January 17, 2014 at 03:06 PM