From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research: In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of...Bruce Schneier From Schneier on Security | June 4, 2015 at 11:36 AM
Monday night, EPIC -- that's the Electronic Privacy Information Center -- had its annual Champions of Freedom Dinner. I tell you this for two reasons. One, I received...Bruce Schneier From Schneier on Security | June 3, 2015 at 05:31 PM
There are smart billboards in Russia that change what they display when cops are watching. Of course there are a gazillion ways this kind of thing will go wrong...Bruce Schneier From Schneier on Security | June 3, 2015 at 03:15 PM
This isn't good: An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation's busiest airports,...Bruce Schneier From Schneier on Security | June 2, 2015 at 08:39 AM
Okay, maybe not so fun. Quiz 1: "Just How Kafkaesque is the Court that Oversees NSA Spying?" Quiz 2: "Can You Tell the Difference Between Bush and Obama on the...Bruce Schneier From Schneier on Security | June 1, 2015 at 02:12 PM
According to a Reuters article, the US military tried to launch Stuxnet against North Korea in addition to Iran: According to one U.S. intelligence source, Stuxnet's...Bruce Schneier From Schneier on Security | June 1, 2015 at 07:33 AM
It's almost as if they wrote it for me. These devices, which are known as super conducting quantum interference devices (SQUIDS for short), can be attached to NSA...Bruce Schneier From Schneier on Security | May 31, 2015 at 05:08 PM
United Nation's Office of the High Commissioner released a report on the value of encryption and anonymity to the world: Summary: In the present report, submitted...Bruce Schneier From Schneier on Security | May 29, 2015 at 08:49 AM
The University of Adelaide is offering a new MOOC on "Cyberwar, Surveillance and Security." Here's a teaser video. I was interviewed for the class, and make a brief...Bruce Schneier From Schneier on Security | May 28, 2015 at 08:19 AM
I don't know enough about the methodology to judge it, but it's interesting: In total, 64 cities are categorised as 'extreme risk' in Verisk Maplecroft's new Global...Bruce Schneier From Schneier on Security | May 27, 2015 at 08:51 AM
A researcher was able to steal money from Starbucks by exploiting a race condition in their gift-card value-transfer protocol. Basically, by initiating two identical...Bruce Schneier From Schneier on Security | May 26, 2015 at 05:58 PM
They're coming to the US: It's called Skunk, a type of "malodorant," or in plainer language, a foul-smelling liquid. Technically nontoxic but incredibly disgusting...Bruce Schneier From Schneier on Security | May 26, 2015 at 07:18 AM
Interesting story of a complex and deeply hidden bug -- with AES as a part of it....Bruce Schneier From Schneier on Security | May 25, 2015 at 10:20 AM
The latest one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 22, 2015 at 05:39 PM
A man was arrested for drug dealing based on the IP address he used while querying the USPS package tracking website....Bruce Schneier From Schneier on Security | May 22, 2015 at 01:33 PM
The ACLU's Chris Soghoian explains (time 25:52-30:55) why the current debate over Section 215 of the Patriot Act is just a minor facet of a large and complex bulk...Bruce Schneier From Schneier on Security | May 22, 2015 at 06:45 AM
This is interesting: The surveys find that Americans feel privacy is important in their daily lives in a number of essential ways. Yet, they have a pervasive sense...Bruce Schneier From Schneier on Security | May 21, 2015 at 02:05 PM
Logjam is a new attack against the Diffie-Hellman key-exchange protocol used in TLS. Basically: The Logjam attack allows a man-in-the-middle attacker to downgrade...Bruce Schneier From Schneier on Security | May 21, 2015 at 07:36 AM