From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Surprising no one who has been following this sort of thing, headphones can be used as microphones....Bruce Schneier From Schneier on Security | November 23, 2016 at 07:56 AM
Vice Motherboard has an interesting article about governments using social-media platforms for propaganda and surveillance, and the companies that are supporting...Bruce Schneier From Schneier on Security | November 22, 2016 at 03:29 PM
According to a Harris poll, 39% of Americans would give up sex for a year for perfect computer security: According to an online survey among over 2,000 U.S. adults...Bruce Schneier From Schneier on Security | November 21, 2016 at 07:04 AM
Squid catch is down, so fisherman are trying to sell more processed product. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | November 18, 2016 at 05:10 PM
This is pretty amazing: International customers and users of disposable or prepaid phones are the people most affected by the software. But the scope is unclear...Bruce Schneier From Schneier on Security | November 18, 2016 at 03:22 PM
This is impressive research: "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals": Abstract: In this study, we present WindTalker...Bruce Schneier From Schneier on Security | November 18, 2016 at 07:40 AM
PoisonTap is an impressive hacking tool that can compromise computers via the USB port, even when they are password protected. What's interesting is the chain of...Bruce Schneier From Schneier on Security | November 17, 2016 at 09:22 AM
Yet another way to collect personal data on people without their knowledge or consent: "Lifestyle chemistries from phones for individual profiling": Abstract: Imagine...Bruce Schneier From Schneier on Security | November 16, 2016 at 08:40 AM
It's over. The voting went smoothly. As of the time of writing, there are no serious fraud allegations, nor credible evidence that anyone hacked the voting rolls...Bruce Schneier From Schneier on Security | November 15, 2016 at 08:09 AM
Julian Oliver has designed and built a cellular eavesdropping device that's disguised as an old HP printer. Masquerading as a regular cellular service provider,...Bruce Schneier From Schneier on Security | November 14, 2016 at 02:12 PM
There's a Kickstarter for a sticker that you can stick on a glove and then register with a biometric access system like an iPhone. It's an interesting security...Bruce Schneier From Schneier on Security | November 14, 2016 at 10:26 AM
Pretty neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | November 11, 2016 at 05:02 PM
Interesting research: "Using Artificial Intelligence to Identify State Secrets," by Renato Rocha Souza, Flavio Codeco Coelho, Rohan Shah, and Matthew Connelly....Bruce Schneier From Schneier on Security | November 11, 2016 at 02:18 PM
This is some interesting research. You can fool facial recognition systems by wearing glasses printed with elements of other peoples' faces. Mahmood Sharif, Sruti...Bruce Schneier From Schneier on Security | November 11, 2016 at 08:31 AM
Ad networks are surreptitiously using ultrasonic communications to jump from device to device. It should come as no surprise that this communications channel can...Bruce Schneier From Schneier on Security | November 10, 2016 at 01:19 PM
Late last month, popular websites like Twitter, Pinterest, Reddit and PayPal went down for most of a day. The distributed denial-of-service attack that caused the...Bruce Schneier From Schneier on Security | November 10, 2016 at 07:06 AM
The NSA has been abandoning secret and proprietary cryptographic algorithms in favor of commercial public algorithms, generally known as "Suite B." In 2010, an...Bruce Schneier From Schneier on Security | November 9, 2016 at 01:00 PM
This is exactly the sort of Internet-of-Things attack that has me worried: "IoT Goes Nuclear: Creating a ZigBee Chain Reaction" by Eyal Ronen, Colin OFlynn, Adi...Bruce Schneier From Schneier on Security | November 9, 2016 at 07:54 AM