From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...Bruce Schneier From Schneier on Security | March 18, 2015 at 03:50 AM
I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies...Bruce Schneier From Schneier on Security | March 18, 2015 at 12:13 AM
The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...Bruce Schneier From Schneier on Security | March 12, 2015 at 03:59 PM
Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...Bruce Schneier From Schneier on Security | March 12, 2015 at 07:22 AM
More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...Bruce Schneier From Schneier on Security | March 11, 2015 at 03:41 PM
The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...Bruce Schneier From Schneier on Security | March 11, 2015 at 07:53 AM
The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...Bruce Schneier From Schneier on Security | March 10, 2015 at 03:59 PM
New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...Bruce Schneier From Schneier on Security | March 10, 2015 at 07:50 AM
Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...Bruce Schneier From Schneier on Security | March 9, 2015 at 02:46 PM
The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...Bruce Schneier From Schneier on Security | March 9, 2015 at 08:57 AM
There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...Bruce Schneier From Schneier on Security | March 6, 2015 at 05:21 PM
Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...Bruce Schneier From Schneier on Security | March 6, 2015 at 03:52 PM
This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...Bruce Schneier From Schneier on Security | March 6, 2015 at 11:57 AM
New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...Bruce Schneier From Schneier on Security | March 6, 2015 at 07:28 AM
The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...Bruce Schneier From Schneier on Security | March 5, 2015 at 08:00 AM
One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...Bruce Schneier From Schneier on Security | March 4, 2015 at 08:00 AM
On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...Bruce Schneier From Schneier on Security | March 3, 2015 at 02:59 PM
Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...Bruce Schneier From Schneier on Security | March 3, 2015 at 02:12 PM
The thing about infrastructure is that everyone uses it. If it's secure, it's secure for everyone. And if it's insecure, it's insecure for everyone. This forces...Bruce Schneier From Schneier on Security | March 2, 2015 at 07:59 AM
Scientists are attaching cameras to Humboldt squid to watch them communicate with each other. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | February 27, 2015 at 06:00 PM