From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Some minimal information about the NSA's abilities to hack networks via submarine....Bruce Schneier From Schneier on Security | August 12, 2016 at 01:48 PM
Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system...Bruce Schneier From Schneier on Security | August 12, 2016 at 07:52 AM
Here's an interesting hack against a computer's monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor...Bruce Schneier From Schneier on Security | August 11, 2016 at 02:09 PM
We're seeing car thefts in the wild accomplished through hacking: Houston police have arrested two men for a string of high-tech thefts of trucks and SUVs in the...Bruce Schneier From Schneier on Security | August 11, 2016 at 07:32 AM
Scott Atran has done some really interesting research on why ordinary people become terrorists. Academics who study warfare and terrorism typically don't conduct...Bruce Schneier From Schneier on Security | August 10, 2016 at 01:20 PM
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats....Bruce Schneier From Schneier on Security | August 10, 2016 at 07:06 AM
EFF has the story of malware from the Kazakhstan government against "journalists and political activists critical of Kazakhstan's authoritarian government, along...Bruce Schneier From Schneier on Security | August 9, 2016 at 03:14 PM
Citizen Lab has a new report on an Iranian government hacking program that targets dissidents. From a Washington Post op-ed by Ron Deibert: Al-Ameer is a net savvy...Bruce Schneier From Schneier on Security | August 9, 2016 at 06:26 AM
You can order a cocktail made with squid ink soda at Hank's Oyster Bar in Washington, DC....Bruce Schneier From Schneier on Security | August 5, 2016 at 05:22 PM
I've been saying for years that it's bad security advice, that it encourages poor passwords. Lorrie Cranor, now the FTC's chief technologist, agrees: By studying...Bruce Schneier From Schneier on Security | August 5, 2016 at 08:53 AM
The Open Technology Institute of the New America Foundation has released a policy paper on the vulnerabilities equities process: "Bugs in the System: A Primer on...Bruce Schneier From Schneier on Security | August 4, 2016 at 08:25 AM
NIST is no longer recommending two-factor authentication systems that use SMS, because of their many insecurities. In the latest draft of its Digital Authentication...Bruce Schneier From Schneier on Security | August 3, 2016 at 08:11 AM
Last week, President Obama issued a policy directive (PPD-41) on cyber-incident response coordination. The FBI is in charge, which is no surprise. Actually, there's...Bruce Schneier From Schneier on Security | August 2, 2016 at 07:40 AM
Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille's research team revealed a new set of wireless keyboard attacks...Bruce Schneier From Schneier on Security | August 1, 2016 at 04:07 PM
Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security...Bruce Schneier From Schneier on Security | August 1, 2016 at 07:49 AM
Archie McPhee sells glow-in-the-dark finger tentacles. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | July 29, 2016 at 05:05 PM