From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic...Bruce Schneier From Schneier on Security | May 4, 2016 at 07:51 AM
Turns out there are two different conferences with the title International Conference on Cyber Security (ICCS 2016), one real and one fake. Richard Clayton has...Bruce Schneier From Schneier on Security | May 2, 2016 at 04:45 PM
Interesting research: Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, "Security Analysis of Emerging Smart Home Applications": Abstract: Recently, several competing...Bruce Schneier From Schneier on Security | May 2, 2016 at 10:01 AM
There's a squid shortage along the Pacific coast of the Americas. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | April 29, 2016 at 05:05 PM
I'm writing a book on security in the highly connected Internet-of-Things World. Tentative title: Click Here to Kill Everything Peril and Promise in a Hyper-connected...Bruce Schneier From Schneier on Security | April 29, 2016 at 02:02 PM
In Data and Golliath, I talk about the self-censorship that comes along with broad surveillance. This interesting research documents this phenomenon in Wikipedia...Bruce Schneier From Schneier on Security | April 29, 2016 at 07:28 AM
Amazon Unlimited is a all-you-can-read service. You pay one price and can read anything that's in the program. Amazon pays authors out of a fixed pool, on the basis...Bruce Schneier From Schneier on Security | April 28, 2016 at 09:20 AM
Testimonies of Matt Blaze and Danny Weitzner, both on April 19th before the House Energy and Commerce Committee. And the hearing....Bruce Schneier From Schneier on Security | April 27, 2016 at 07:46 AM
Interesting research: In the study, sponsored in part by the Air Force Office of Scientific Research (AFOSR), the researchers recruited a group of 42 volunteers...Bruce Schneier From Schneier on Security | April 26, 2016 at 10:33 AM
Drones can graffiti walls that no person can reach. (Note that wired.com blocks ad blockers. My trick is to copy the page and then paste it into my text editor.)...Bruce Schneier From Schneier on Security | April 25, 2016 at 01:07 PM
Last week there was a big news story about the Blackberry encryption. The news was that all BlackBerry devices share a global encryption key, and that the Canadian...Bruce Schneier From Schneier on Security | April 25, 2016 at 06:54 AM
I assume this is more amusing to people who know about My Little Pony. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | April 22, 2016 at 05:24 PM
Dilbert has a series: 1, 2, 3, 4, and 5. SMBC. And three more that make it clear this is a security vs. surveillance debate. Also this....Bruce Schneier From Schneier on Security | April 22, 2016 at 03:19 PM
If doping weren't enough, cyclists are cheating in races by hiding tiny motors in their bicycles. There are many detection techniques: For its report, Stade 2 positioned...Bruce Schneier From Schneier on Security | April 22, 2016 at 07:22 AM
The hacker who hacked Hacking Team posted a lengthy description of how he broke into the company and stole everything. Two articles. ETA: This post originally had...Bruce Schneier From Schneier on Security | April 21, 2016 at 07:42 AM
NYU Helen Nissenbaum gave an excellent lecture at Brown University last month, where she rebutted those who think that we should not regulate data collection, only...Bruce Schneier From Schneier on Security | April 20, 2016 at 07:27 AM
GCHQ detected a potential pre-publication leak of a Harry Potter book, and alerted the publisher. Is this what British national intelligence is supposed to be doing...Bruce Schneier From Schneier on Security | April 19, 2016 at 02:39 PM
Last year, we learned about a backdoor in Juniper firewalls, one that seems to have been added into the code base. There's now some good research: "A Systematic...Bruce Schneier From Schneier on Security | April 19, 2016 at 06:59 AM
There's a new law that will enforce DNA testing for everyone: citizens, expatriates, and visitors. They promise that the program "does not include genealogical...Bruce Schneier From Schneier on Security | April 18, 2016 at 01:46 PM