From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...Bruce Schneier From Schneier on Security | June 7, 2016 at 03:59 PM
There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...Bruce Schneier From Schneier on Security | June 6, 2016 at 07:10 AM
Earlier this week, I was at the ninth Workshop on Security and Human Behavior, hosted at Harvard University. SHB is a small invitational gathering of people studying...Bruce Schneier From Schneier on Security | June 3, 2016 at 02:36 PM
There's a new piece of malware called Irongate, which is obviously inspired by Stuxnet. We don't know who is responsible for it. Slashdot thread....Bruce Schneier From Schneier on Security | June 3, 2016 at 07:33 AM
Citizen Lab has the details: This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call Stealth Falcon....Bruce Schneier From Schneier on Security | June 2, 2016 at 08:49 AM
This is a good summary article on the fallibility of DNA evidence. Most interesting to me are the parts on the proprietary algorithms used in DNA matching: William...Bruce Schneier From Schneier on Security | May 31, 2016 at 02:04 PM
A proposed law in Albany, NY, would make it a crime to walk away from airport screening. Aside from wondering why county lawmakers are getting involved with what...Bruce Schneier From Schneier on Security | May 31, 2016 at 07:35 AM
People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...Bruce Schneier From Schneier on Security | May 30, 2016 at 11:10 AM
This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...Bruce Schneier From Schneier on Security | May 27, 2016 at 05:28 PM
Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...Bruce Schneier From Schneier on Security | May 27, 2016 at 07:19 AM
Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...Bruce Schneier From Schneier on Security | May 26, 2016 at 07:31 AM
There's a new trend in Silicon Valley startups; companies are not collecting and saving data on their customers: In Silicon Valley, there's a new emphasis on putting...Bruce Schneier From Schneier on Security | May 25, 2016 at 03:37 PM
Good debate in the Wall Street Journal. This isn't an obvious one; there are good arguments on both sides....Bruce Schneier From Schneier on Security | May 25, 2016 at 06:58 AM
This is good news: Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities...Bruce Schneier From Schneier on Security | May 24, 2016 at 03:12 PM
Google is trying to bring this to Android developers by the end of the year: Today, secure logins -- like those used by banks or in the enterprise environment -...Bruce Schneier From Schneier on Security | May 24, 2016 at 09:35 AM
Really interesting research: "Online tracking: A 1-million-site measurement and analysis," by Steven Englehardt and Arvind Narayanan: Abstract: We present the largest...Bruce Schneier From Schneier on Security | May 23, 2016 at 06:33 AM
Video. Plus an octopus kite, with another squid kite in the background. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | May 20, 2016 at 05:20 PM