From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research can identify a person by reading their thermal signature in complete darkness and then matching it with ordinary photographs. Research paper: Abstract...Bruce Schneier From Schneier on Security | August 5, 2015 at 07:02 AM
A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was...Bruce Schneier From Schneier on Security | August 4, 2015 at 09:24 AM
Brink's sells an Internet-enabled smart safe called the CompuSafe Galileo. Despite being sold as a more secure safe, it's wildly insecure: Vulnerabilities found...Bruce Schneier From Schneier on Security | August 3, 2015 at 02:27 PM
I could use some help finding a host for my monthly newsletter, Crypto-Gram. My old setup just wasn't reliable enough. I had a move planned, but that fell through...Bruce Schneier From Schneier on Security | August 3, 2015 at 06:58 AM
It tried to steal their catch. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 31, 2015 at 05:17 PM
I'm speaking at an Infoedge event at Bali Hai Golf Club in Las Vegas, at 5 PM on August 5, 2015. I'm speaking at DefCon 23 on Friday, August 7, 2015. I'm speaking...Bruce Schneier From Schneier on Security | July 31, 2015 at 03:21 PM
Fireeye has a detailed report of a sophisticated piece of Russian malware: HAMMERTOSS. It uses some clever techniques to hide: The Hammertoss backdoor malware looks...Bruce Schneier From Schneier on Security | July 31, 2015 at 12:12 PM
At the Aspen Security Forum two weeks ago, James Comey (and others) explicitly talked about the "going dark" problem, describing the specific scenario they are...Bruce Schneier From Schneier on Security | July 31, 2015 at 07:08 AM
New paper: "'...no one can hack my mind': Comparing Expert and Non-Expert Security Practices," by Iulia Ion, Rob Reeder, and Sunny Consolvo. Abstract: The state...Bruce Schneier From Schneier on Security | July 30, 2015 at 03:21 PM
It's common wisdom that the NSA was unable to intercept phone calls from Khalid al-Mihdhar in San Diego to Bin Ladin in Yemen because of legal restrictions. This...Bruce Schneier From Schneier on Security | July 30, 2015 at 07:13 AM
The latest in identification by data: Webber said a tipster had spotted recent activity from Nunn on the Spotify streaming service and alerted law enforcement....Bruce Schneier From Schneier on Security | July 29, 2015 at 02:43 PM
This is a story of a very high-tech kidnapping: FBI court filings unsealed last week showed how Denise Huskins' kidnappers used anonymous remailers, image sharing...Bruce Schneier From Schneier on Security | July 29, 2015 at 07:34 AM
New research: "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," by Mathy Vanhoef and Frank Piessens: Abstract: We present new biases in RC4, break...Bruce Schneier From Schneier on Security | July 28, 2015 at 01:09 PM
The Stagefright vulnerability for Android phones is a bad one. It's exploitable via a text message (details depend on auto downloading of the particular phone),...Bruce Schneier From Schneier on Security | July 28, 2015 at 07:37 AM
This is an interesting article that looks at Hacking Team's purchasing of zero-day (0day) vulnerabilities from a variety of sources: Hacking Team's relationships...Bruce Schneier From Schneier on Security | July 27, 2015 at 07:17 AM
The California market squid, Doryteuthis opalescens, can manipulate its color in a variety of ways: Reflectins are aptly-named proteins unique to the light-sensing...Bruce Schneier From Schneier on Security | July 24, 2015 at 05:18 PM
A worker in Amazon's packaging department figured out how to deliver electronics to himself: Since he was employed with the packaging department, he had easy access...Bruce Schneier From Schneier on Security | July 24, 2015 at 01:49 PM
This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast...Bruce Schneier From Schneier on Security | July 23, 2015 at 07:17 AM