From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Okay, this is weird. FireEye has gone to court to prevent ERNW from disclosing vulnerabilities in FireEye products. FireEye should know better. Here's FireEye's...Bruce Schneier From Schneier on Security | September 17, 2015 at 01:56 PM
The chip is built on glass: Shattering the glass is straightforward. When the proper circuit is toggled, a small resistor within the substrate heats up until the...Bruce Schneier From Schneier on Security | September 17, 2015 at 08:17 AM
A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...Bruce Schneier From Schneier on Security | September 16, 2015 at 02:40 PM
A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...Bruce Schneier From Schneier on Security | September 16, 2015 at 11:09 AM
President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...Bruce Schneier From Schneier on Security | September 16, 2015 at 07:05 AM
When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...Bruce Schneier From Schneier on Security | September 15, 2015 at 07:38 AM
Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...Bruce Schneier From Schneier on Security | September 14, 2015 at 07:26 AM
Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 11, 2015 at 05:13 PM
In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...Bruce Schneier From Schneier on Security | September 11, 2015 at 03:08 PM
Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...Bruce Schneier From Schneier on Security | September 11, 2015 at 07:45 AM
Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...Bruce Schneier From Schneier on Security | September 10, 2015 at 01:30 PM
The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...Bruce Schneier From Schneier on Security | September 10, 2015 at 07:00 AM
It's not just humans who dislike the small flying objects. YouTube has videos of drones being stared at quizzically by a moose, harassed by a raven, attacked by...Bruce Schneier From Schneier on Security | September 9, 2015 at 02:30 PM
Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even...Bruce Schneier From Schneier on Security | September 9, 2015 at 09:42 AM
Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...Bruce Schneier From Schneier on Security | September 8, 2015 at 07:02 AM
Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...Bruce Schneier From Schneier on Security | September 7, 2015 at 10:14 AM
Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | September 4, 2015 at 05:07 PM
This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...Bruce Schneier From Schneier on Security | September 4, 2015 at 03:19 PM
Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...Bruce Schneier From Schneier on Security | September 4, 2015 at 09:16 AM