From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q...Bruce Schneier From Schneier on Security | February 2, 2016 at 08:11 AM
The NSA and GCHQ have successfully hacked Israel's drones, according to the Snowden documents. The story is being reported by the Intercept and Der Spiegel. The...Bruce Schneier From Schneier on Security | February 1, 2016 at 03:27 PM
Rob Joyce, the head of the NSA's Tailored Access Operations (TAO) group -- basically the country's chief hacker -- spoke in public earlier this week. He talked...Bruce Schneier From Schneier on Security | February 1, 2016 at 07:42 AM
From 1909, for squid fishing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | January 29, 2016 at 05:23 PM
Cyberthreats are changing. We're worried about hackers crashing airplanes by hacking into computer networks. We're worried about hackers remotely disabling cars...Bruce Schneier From Schneier on Security | January 29, 2016 at 08:29 AM
This is interesting: Game theory decision-making is based entirely on reason, but humans don't always behave rationally. David Rand, assistant professor of psychology...Bruce Schneier From Schneier on Security | January 28, 2016 at 07:18 AM
This is just awful. Their troll -- or trolls, as the case may be -- have harassed Paul and Amy in nearly every way imaginable. Bomb threats have been made under...Bruce Schneier From Schneier on Security | January 27, 2016 at 07:20 AM
There's a lot out there: The feed includes images of marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back...Bruce Schneier From Schneier on Security | January 25, 2016 at 07:25 AM
North Coast Squid is a local writing journal from Manzanita, Oregon. It's going to publish its fifth edition this year. As usual, you can also use this squid post...Bruce Schneier From Schneier on Security | January 22, 2016 at 05:19 PM
The UK government is pushing something called the MIKEY-SAKKE protocol to secure voice. Basically, it's an identity-based system that necessarily requires a trusted...Bruce Schneier From Schneier on Security | January 22, 2016 at 03:23 PM
Interesting research: Douglas W. Allen and Peter T. Leeson, "Institutionally Constrained Technology Adoption: Resolving the Longbow Puzzle," Journal of Law and...Bruce Schneier From Schneier on Security | January 22, 2016 at 07:44 AM
I've already written about Sean Penn's opsec while communicating with El Chapo. Here's the technique of mirroring, explained: El chapo then switched to a complex...Bruce Schneier From Schneier on Security | January 21, 2016 at 07:19 AM
For the right reasons too: Axelle Lemaire, the Euro nation's digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus...Bruce Schneier From Schneier on Security | January 20, 2016 at 06:02 AM
Last July, a still-anonymous hacker broke into the network belonging to the cyberweapons arms manufacturer Hacking Team, and dumped an enormous amount of its proprietary...Bruce Schneier From Schneier on Security | January 19, 2016 at 03:34 PM
Counterfeiters are makingtickets for the Broadway show "Hamilton." Counterfeiting is much easier when the person you're passing the fakes off to doesn't know what...Bruce Schneier From Schneier on Security | January 18, 2016 at 02:37 PM
The BBC and Buzzfeed are jointly reporting on match fixing in tennis. Their story is based partially on leaked documents and partly on data analysis. BuzzFeed News...Bruce Schneier From Schneier on Security | January 18, 2016 at 11:51 AM
Jonathan Zittrain proposes a very interesting hypothetical: Suppose a laptop were found at the apartment of one of the perpetrators of last year's Paris attacks...Bruce Schneier From Schneier on Security | January 16, 2016 at 06:26 AM
Troy Hunt has identified a new spam vector. PayPal allows someone to send someone else a $0 invoice. The spam is in the notes field. But it's a legitimate e-mail...Bruce Schneier From Schneier on Security | January 15, 2016 at 07:45 AM