From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The new 802.11bf standard will turn Wi-Fi devices into object sensors:
In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn...Bruce Schneier From Schneier on Security | April 1, 2021 at 02:42 PM
The oldest known cephalopod — the ancestor of all modern octopuses, squid, cuttlefish and nautiluses — is 500 million years old.
As usual, you can also use this...Bruce Schneier From Schneier on Security | April 1, 2021 at 11:12 AM
News article:
Most troublingly, Activision says that the “cheat” tool has been advertised multiple times on a popular cheating forum under the title “new COD hack...Bruce Schneier From Schneier on Security | April 1, 2021 at 11:03 AM
A mafia fugitive hiding out in the Dominican Republic was arrested when investigators found his YouTube cooking channel and identified him by his distinctive arm...Bruce Schneier From Schneier on Security | April 1, 2021 at 10:39 AM
Researchers have discovered a new Android app called “System Update” that is a sophisticated Remote-Access Trojan (RAT). From a news article:
The broad range of...Bruce Schneier From Schneier on Security | March 30, 2021 at 11:00 AM
A squid potato masher for only $11.50.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my...Bruce Schneier From Schneier on Security | March 26, 2021 at 09:44 AM
Lukasz Olejnik has a good essay on hacking weapons systems.
Basically, there is no reason to believe that software in weapons systems is any more vulnerability...Bruce Schneier From Schneier on Security | March 26, 2021 at 09:41 AM
This is a current list of where and when I am scheduled to speak:
I’m keynoting the (all-virtual) RSA Conference 2021, May 17-20, 2021.
I’m keynoting the 5th International...Schneier.com Webmaster From Schneier on Security | March 23, 2021 at 01:35 AM
It’s not yet very accurate or practical, but under ideal conditions it is possible to figure out the shape of a house key by listening to it being used.
Listen...Bruce Schneier From Schneier on Security | March 22, 2021 at 04:40 PM
A vulnerability in the Accellion file-transfer program is being used by criminal groups to hack networks worldwide.
There’s much in the article about when Accellion...Bruce Schneier From Schneier on Security | March 22, 2021 at 04:35 PM
This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. There’s a lot of fluff about glitterbombs...Bruce Schneier From Schneier on Security | March 19, 2021 at 03:54 PM
Vice is reporting on a cell phone vulnerability caused by commercial SMS services. One of the things these services permit is text message forwarding. It turns...Bruce Schneier From Schneier on Security | March 18, 2021 at 04:24 PM
Google has demonstrated exploiting the Spectre CPU attack remotely over the web:
Today, we’re sharing proof-of-concept (PoC) code that confirms the practicality...Bruce Schneier From Schneier on Security | March 17, 2021 at 02:19 PM
Security researchers have recently discovered a botnet with a novel defense against takedowns. Normally, authorities can disable a botnet by taking over its command...Bruce Schneier From Schneier on Security | March 15, 2021 at 04:13 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the Australian Cyber Conference 2021 on March 17 and 18, 2021.
I’m keynotingRSA...Schneier.com Webmaster From Schneier on Security | March 13, 2021 at 10:32 PM
Nick Weaver has an excellent post on the Microsoft Exchange hack:
The investigative journalist Brian Krebs has produced a handy timeline of events and a few things...Bruce Schneier From Schneier on Security | March 9, 2021 at 05:34 PM
Andrew Appel and Susan Greenhalgh have a blog post on the insecurity of ES&S’s software authentication system:
It turns out that ES&S has bugs in their hash-code...Bruce Schneier From Schneier on Security | March 9, 2021 at 05:27 PM
Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“:
Abstract: Overnight, Apple has...Bruce Schneier From Schneier on Security | March 9, 2021 at 03:50 PM
Really interesting research:
“Exploitation and Sanitization of Hidden Data in PDF Files”
Abstract: Organizations publish and share more and more electronic documents...Bruce Schneier From Schneier on Security | March 9, 2021 at 03:45 PM
Science has a paper (and commentary) on generating 250 random terabits per second with a laser. I don’t know how cryptographically secure they are, but that can...Bruce Schneier From Schneier on Security | March 9, 2021 at 03:42 PM