From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards...Bruce Schneier From Schneier on Security | September 16, 2016 at 01:12 PM
Research paper: "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," by Ishtiaq Rouf, Rob Miller, Hossen...Bruce Schneier From Schneier on Security | September 16, 2016 at 09:59 AM
Remember the San Bernadino killer's iPhone, and how the FBI maintained that they couldn't get the encryption key without Apple providing them with a universal back...Bruce Schneier From Schneier on Security | September 15, 2016 at 09:54 AM
In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...Bruce Schneier From Schneier on Security | September 14, 2016 at 07:21 AM
Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely...Bruce Schneier From Schneier on Security | September 13, 2016 at 03:09 PM
The Intercept has published the manuals for Harris Corporation's IMSI catcher: Stingray. It's an impressive surveillance device....Bruce Schneier From Schneier on Security | September 13, 2016 at 08:51 AM
It costs less than $60. For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo...Bruce Schneier From Schneier on Security | September 12, 2016 at 03:07 PM
The malware "Mal/Miner-C" infects Internet-exposed Seagate Central Network Attached Storage (NAS) devices, and from there takes over connected computers to mine...Bruce Schneier From Schneier on Security | September 12, 2016 at 08:01 AM
Research on color-changing materials: What do squid and jellyfish skin have in common with human skin? All three have inspired a team of chemists to create materials...Bruce Schneier From Schneier on Security | September 9, 2016 at 05:31 PM
We have leak from yet another cyberweapons arms manufacturer: the Italian company RCS Labs. Vice Motherboard reports on a surveillance video demo: The video shows...Bruce Schneier From Schneier on Security | September 9, 2016 at 03:18 PM
Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company's...Bruce Schneier From Schneier on Security | September 9, 2016 at 10:12 AM
Ever since Ian Kristi, Apple's Head of Security Engineering and Architecture, presented the company's key backup technology at Black Hat 2016, people have been...Bruce Schneier From Schneier on Security | September 8, 2016 at 09:00 AM
For former head of French SIGINT gave a talk (removed from YouTube where he talked about a lot of things he probably shouldn't have. If anyone has 1) a transcript...Bruce Schneier From Schneier on Security | September 7, 2016 at 06:57 AM
Yet another leaked catalog of Internet attack services, this one specializing in disinformation: But Aglaya had much more to offer, according to its brochure. For...Bruce Schneier From Schneier on Security | September 6, 2016 at 03:27 PM
The Intercept has published a 120-page catalog of spy gear from the British defense company Cobham. This is equipment available to police forces. The catalog was...Bruce Schneier From Schneier on Security | September 6, 2016 at 07:31 AM
Easy recipe. You can get the red pepper flakes and red pepper paste at most grocery stores. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | September 4, 2016 at 04:26 AM
I was reading this 2014 McAfee report on the economic impact of cybercrime, and came across this interesting quote on how security is a tax on the Internet economy...Bruce Schneier From Schneier on Security | September 1, 2016 at 10:49 AM
We're starting to see some information on the Israeli cyber-weapons arms manufacturer that sold the iPhone zero-day exploit to the United Arab Emirates so they...Bruce Schneier From Schneier on Security | August 31, 2016 at 09:16 AM
Another paper on using Wi-Fi for surveillance. This one is on identifying people by their body shape. "FreeSense:Indoor Human Identification with WiFi Signals":...Bruce Schneier From Schneier on Security | August 30, 2016 at 01:57 PM
This is interesting research: "Keystroke Recognition Using WiFi Signals." Basically, the user's hand positions as they type distorts the Wi-Fi signal in predictable...Bruce Schneier From Schneier on Security | August 30, 2016 at 07:04 AM