From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is serious: Cisco Systems officials are warning customers of a series of attacks that completely hijack critical networking gear by swapping out the valid...Bruce Schneier From Schneier on Security | August 19, 2015 at 01:34 PM
This is interesting: First, it integrates with corporate directories such as Active Directory and social media sites like LinkedIn to map the connections between...Bruce Schneier From Schneier on Security | August 19, 2015 at 08:11 AM
Two former Kaspersky employees have accused the company of faking malware to harm rival antivirus products. They would falsely classify legitimate files as malicious...Bruce Schneier From Schneier on Security | August 18, 2015 at 03:35 PM
I've previously written about mail cover -- the practice of recording the data on mail envelopes. Sai has been covering the issue in more detail, and recently received...Bruce Schneier From Schneier on Security | August 18, 2015 at 07:48 AM
One of the books confiscated from Chelsea Manning was a copy of Data and Goliath....Bruce Schneier From Schneier on Security | August 17, 2015 at 05:24 PM
Oracle's CSO Mary Ann Davidson wrote a blog post ranting against security experts finding vulnerabilities in her company's products. The blog post has been taken...Bruce Schneier From Schneier on Security | August 17, 2015 at 07:45 AM
There's a new article, published jointly by The New York Times and ProPublica, aboutNSA's longstanding relationship with AT&T. It's based on the Snowden documents...Bruce Schneier From Schneier on Security | August 15, 2015 at 01:44 PM
I think it's a very pretty creature with some impressive adaptations. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | August 15, 2015 at 01:32 PM
Good operational security is hard, and often uses manual technologies: Investigators described how Messina Denaro, 53, disdains telecommunications and relies on...Bruce Schneier From Schneier on Security | August 13, 2015 at 07:33 AM
Prosecutors from New York, London, Paris, and Madrid wrote an op-ed in yesterday's New York Times in favor of backdoors in cell phone encryption. There are a number...Bruce Schneier From Schneier on Security | August 12, 2015 at 03:18 PM
This FBI alert is interesting: (U//FOUO) In May 2015, the wife of a US military member was approached in front of her home by two Middle-Eastern males. The men...Bruce Schneier From Schneier on Security | August 12, 2015 at 06:49 AM
Local police are trying to convince drug dealers to turn each other in by pointing out that it reduces competition. It's a comical tactic with serious results:...Bruce Schneier From Schneier on Security | August 11, 2015 at 07:41 AM
Interesting research detecting betrayal in the game of Diplomacy by analyzing interplayer messages. One harbinger was a shift in politeness. Players who were excessively...Bruce Schneier From Schneier on Security | August 10, 2015 at 04:32 PM
Divers discover a large mass of Ommastrephes bartramii eggs: Earlier this month, a team of divers swimming off the coast of Turkey discovered something unexpected...Bruce Schneier From Schneier on Security | August 7, 2015 at 05:58 PM
Before Edward Snowden told us so much about NSA surveillance, before Mark Klein told us a little, even before 9/11, Duncan Campbell broke the story of ECHELON....Bruce Schneier From Schneier on Security | August 7, 2015 at 08:00 AM
Good fictional account of an average computer user and how people understand and view security. Related: "Real World Use Cases for High-Risk Users."...Bruce Schneier From Schneier on Security | August 6, 2015 at 03:26 PM
Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or...Bruce Schneier From Schneier on Security | August 6, 2015 at 07:09 AM