From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This paper wins "best abstract" award: "Quantum Tokens for Digital Signatures," by Shalev Ben David and Or Sattath: Abstract: The fisherman caught a quantum fish...Bruce Schneier From Schneier on Security | October 6, 2016 at 08:03 AM
Forbes is reporting that the Israeli cyberweapons arms manufacturer Wintego has a man-in-the-middle exploit against WhatsApp. It's a weird story. I'm not sure how...Bruce Schneier From Schneier on Security | October 4, 2016 at 02:47 PM
This article on US/China cooperation and competition in cyberspace is an interesting lens through which to examine security policy....Bruce Schneier From Schneier on Security | October 4, 2016 at 07:40 AM
Interesting survey of the cybersecurity culture in Norway. 96% of all Norwegian are online, more than 90% embrace new technology, and 6 of 10 feel capable of judging...Bruce Schneier From Schneier on Security | October 3, 2016 at 07:23 AM
Every few years, a researcher replicates a security study by littering USB sticks around an organization's grounds and waiting to see how many people pick them...Bruce Schneier From Schneier on Security | October 3, 2016 at 07:12 AM
The Gonatus squid eats its own kind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 30, 2016 at 05:14 PM
Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data...Bruce Schneier From Schneier on Security | September 30, 2016 at 07:16 AM
Interesting research from Sasha Romanosky at RAND: Abstract: In 2013, the US President signed an executive order designed to help secure the nation's critical infrastructure...Bruce Schneier From Schneier on Security | September 29, 2016 at 07:51 AM
A new malware tries to detect if it's running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they're...Bruce Schneier From Schneier on Security | September 28, 2016 at 07:34 AM
Neural networks are good at identifying faces, even if they're blurry: In a paper released earlier this month, researchers at UT Austin and Cornell University demonstrate...Bruce Schneier From Schneier on Security | September 27, 2016 at 10:39 AM
Brian Krebs writes about the massive DDoS attack against his site. In fact, the site is down as I post this....Bruce Schneier From Schneier on Security | September 26, 2016 at 04:59 PM
A Lego model of a giant space kraken destroying a Destroyer from Star Wars. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | September 23, 2016 at 05:14 PM
I like this Amtrak security awareness campaign. Especially the use of my term "security theater."...Bruce Schneier From Schneier on Security | September 22, 2016 at 02:03 PM
Impressive remote ,a href="http://www.pcworld.com/article/3121999/security/researchers-demonstrate-remote-attack-against-tesla-model-s.html">hack of the Tesla Model...Bruce Schneier From Schneier on Security | September 21, 2016 at 08:33 AM
This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder...Bruce Schneier From Schneier on Security | September 20, 2016 at 08:34 AM
"Periscope skimmers" are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they're impossible to notice. They're been found...Bruce Schneier From Schneier on Security | September 19, 2016 at 07:16 AM
I got this video from PZ Myers's blog. I know absolutely nothing about it. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | September 16, 2016 at 05:11 PM