From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Presidential candidate John Delaney has announced a plan to create a Department of Cybersecurity. I have long been in favor of a new federal agency to deal with...Bruce Schneier From Schneier on Security | April 17, 2019 at 08:57 AM
FireEye is releasing much more information about the Triton malware that attacks critical infrastructure. It has been discovered in more places. This is also a...Bruce Schneier From Schneier on Security | April 16, 2019 at 07:10 AM
Researchers have found several vulnerabilities in the WPA3 Wi-Fi security protocol: The design flaws we discovered can be divided in two categories. The first category...Bruce Schneier From Schneier on Security | April 15, 2019 at 03:00 PM
Supply chain security is an insurmountably hard problem. The recent focus is on Chinese 5G equipment, but the problem is much broader. This opinion piece looks...Bruce Schneier From Schneier on Security | April 15, 2019 at 07:30 AM
Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | April 12, 2019 at 05:19 PM
In what I am sure is only a first in many similar demonstrations, researchers are able to add or remove cancer signs from CT scans. The results easily fool radiologists...Bruce Schneier From Schneier on Security | April 12, 2019 at 12:13 PM
Flame was discovered in 2012, linked to Stuxnet, and believed to be American in origin. It has recently been linked to more modern malware through new analysis...Bruce Schneier From Schneier on Security | April 12, 2019 at 07:25 AM
Kaspersky has released details about a sophisticated nation-state spyware it calls TajMahal: The TajMahal framework's 80 modules, Shulmin says, comprise not only...Bruce Schneier From Schneier on Security | April 11, 2019 at 07:24 AM
Interesting scheme: It all starts off with a fairly bog standard gallery style certificate. Details of the work, the authenticating agency, a bit of embossing and...Bruce Schneier From Schneier on Security | April 10, 2019 at 06:44 AM
I just noticed this bit from the incredibly weird story of the Chinese woman arrested at Mar-a-Lago: Secret Service agent Samuel Ivanovich, who interviewed Zhang...Bruce Schneier From Schneier on Security | April 9, 2019 at 07:54 AM
Last month, the NSA released Ghidra, a software reverse-engineering tool. Early reactions are uniformly positive. Three news articles....Bruce Schneier From Schneier on Security | April 8, 2019 at 10:50 AM
This is an easy fried squid recipe with saffron and agrodolce. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | April 5, 2019 at 05:29 PM
A recent article overhyped the release of EverCrypt, a cryptography library created using formal methods to prove security against specific attacks. The Quantum...Bruce Schneier From Schneier on Security | April 5, 2019 at 10:31 AM
This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock...Bruce Schneier From Schneier on Security | April 4, 2019 at 03:10 PM
Researchers have been able to fool Tesla's autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of...Bruce Schneier From Schneier on Security | April 4, 2019 at 07:18 AM
Really interesting report from Tactical Tech. Data-driven technologies are an inevitable feature of modern political campaigning. Some argue that they are a welcome...Bruce Schneier From Schneier on Security | April 3, 2019 at 07:26 AM
This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I...Bruce Schneier From Schneier on Security | April 2, 2019 at 07:16 AM
Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and...Bruce Schneier From Schneier on Security | April 1, 2019 at 10:44 AM
It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | March 29, 2019 at 05:15 PM
This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA's DOUBLEPULSAR...Bruce Schneier From Schneier on Security | March 29, 2019 at 07:11 AM