From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
That's the conclusion of a research paper: Once [costs and complexity] are eliminated, it enables big hosting providers to issue and deploy certificates for their...Bruce Schneier From Schneier on Security | December 14, 2016 at 07:46 AM
Interesting: "We used silver and carbon ink to print an image consisting of small rods that are about a millimeter long and a couple of hundred microns wide," said...Bruce Schneier From Schneier on Security | December 13, 2016 at 07:21 AM
A new ransomware, Popcorn Time, gives users the option of infecting others in lieu of paying the ransom. Related: a good general article on ransomware....Bruce Schneier From Schneier on Security | December 12, 2016 at 07:51 AM
It's called Cryptomancer. Think computer hacking plus magic. I know nothing about it, but it feels reminiscent of Shadowrun. Reddit thread. RPG.net thread....Bruce Schneier From Schneier on Security | December 10, 2016 at 10:00 AM
Squid-inspired electronic screens. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | December 9, 2016 at 05:11 PM
Le Monde and the Intercept are reporting about NSA spying in Africa, and NSA spying on in-flight mobile phone calls -- both from the Snowden documents....Bruce Schneier From Schneier on Security | December 8, 2016 at 12:04 PM
There's new malware toolkit that uses stegaography to hide in images: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels...Bruce Schneier From Schneier on Security | December 7, 2016 at 09:06 AM
This article outlines two different types of international phone fraud. The first can happen when you call an expensive country like Cuba: My phone call never actually...Bruce Schneier From Schneier on Security | December 6, 2016 at 07:15 AM
Yale University Press has published a facsimile of the Voynich Manuscript. The manuscript is also available online....Bruce Schneier From Schneier on Security | December 5, 2016 at 03:20 PM
Researchers have found that they can guess various credit-card-number security details by spreading their guesses around multiple websites so as not to trigger...Bruce Schneier From Schneier on Security | December 5, 2016 at 07:25 AM
A 50-foot squid has not been found in New Zealand. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | December 2, 2016 at 07:18 PM
Excellent essay pointing out that election security is a national security issue, and that we need to perform random ballot audits on every future election: The...Bruce Schneier From Schneier on Security | December 2, 2016 at 07:39 AM
Citizen Lab has analyzed how censorship works in the Chinese chat app WeChat: Key Findings: Keyword filtering on WeChat is only enabled for users with accounts...Bruce Schneier From Schneier on Security | December 1, 2016 at 10:29 AM
Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity....Bruce Schneier From Schneier on Security | November 30, 2016 at 10:33 AM
You can rent a 400,000-computer Murai botnet and DDoS anyone you like. BoingBoing post. Slashdot thread....Bruce Schneier From Schneier on Security | November 29, 2016 at 07:01 AM
It's really bad. The ticket machines were hacked. Over the next couple of years, I believe we are going to see the downside of our headlong rush to put everything...Bruce Schneier From Schneier on Security | November 28, 2016 at 06:36 PM
Here's a nice picture of one of the few known poisonous squids. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | November 25, 2016 at 05:30 PM
Was the 2016 presidential election hacked? It's hard to tell. There were no obvious hacks on Election Day, but new reports have raised the question of whether voting...Bruce Schneier From Schneier on Security | November 25, 2016 at 11:00 AM
Susan Landau has an excellent essay on why it's more important than ever to have backdoor-free encryption on our computer and communications systems. Protecting...Bruce Schneier From Schneier on Security | November 23, 2016 at 03:01 PM