From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting story about someone who is almost certainly cheating at professional poker. But then I start to see things that seem so obvious, but I wonder whether...Bruce Schneier From Schneier on Security | October 9, 2019 at 01:26 PM
Interesting: German investigators said Friday they have shut down a data processing center installed in a former NATO bunker that hosted sites dealing in drugs...Bruce Schneier From Schneier on Security | October 9, 2019 at 07:34 AM
Two speakers were censored at the Australian Information Security Association's annual conference this week in Melbourne. Thomas Drake, former NSA employee and...Bruce Schneier From Schneier on Security | October 8, 2019 at 06:15 PM
A new iOS exploit allows jailbreaking of pretty much all version of the iPhone. This is a huge deal for Apple, but at least it doesn't allow someone to remotely...Bruce Schneier From Schneier on Security | October 8, 2019 at 06:24 AM
Ed Snowden has published a book of his memoirs: Permanent Record. I have not read it yet, but I want to point you all towards two pieces of writing about the book...Bruce Schneier From Schneier on Security | October 7, 2019 at 07:53 AM
Cute video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | October 4, 2019 at 05:23 PM
In 1999, I invented the Solitaire encryption algorithm, designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's...Bruce Schneier From Schneier on Security | October 4, 2019 at 01:04 PM
Long Twitter thread about the tracking embedded in modern digital televisions. The thread references three academic papers....Bruce Schneier From Schneier on Security | October 4, 2019 at 07:32 AM
In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22...Bruce Schneier From Schneier on Security | October 3, 2019 at 07:28 AM
There's some interesting new research about Russian APT malware: The Russian government has fostered competition among the three agencies, which operate independently...Bruce Schneier From Schneier on Security | October 2, 2019 at 09:00 AM
Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the...Bruce Schneier From Schneier on Security | October 1, 2019 at 07:54 AM
The United States government's continuing disagreement with the Chinese company Huawei underscores a much larger problem with computer technologies in general:...Bruce Schneier From Schneier on Security | September 30, 2019 at 07:36 AM
There's no proof they did, but there's no proof they didn't. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | September 27, 2019 at 05:23 PM
A paper I co-wrote was just published in Security Journal: "Superheroes on screen: real life lessons for security debates": Abstract: Superhero films and episodic...Bruce Schneier From Schneier on Security | September 27, 2019 at 01:19 PM
The trade war with China has reached a new industry: subway cars. Congress is considering legislation that would prevent the world's largest train maker, the Chinese...Bruce Schneier From Schneier on Security | September 26, 2019 at 07:21 AM
This article discusses an e-commerce fraud technique in the UK. Because the Royal Mail only tracks packages to the postcode -- and not to the address - it's possible...Bruce Schneier From Schneier on Security | September 25, 2019 at 07:01 AM
Yahoo News reported that the Russians have successfully targeted an FBI communications system: American officials discovered that the Russians had dramatically...Bruce Schneier From Schneier on Security | September 24, 2019 at 07:33 AM
Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power...Bruce Schneier From Schneier on Security | September 23, 2019 at 07:34 AM
In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains...Bruce Schneier From Schneier on Security | September 23, 2019 at 06:59 AM
Another piglet squid video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | September 20, 2019 at 05:11 PM