From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A German auction house is selling an SG-41. It looks beautiful. Starting price is 75,000 euros. My guess is that it will sell for around 100K euros....Bruce Schneier From Schneier on Security | May 23, 2019 at 03:05 PM
Summary: Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module. First commercially introduced in 2013, Cisco Trust Anchor...Bruce Schneier From Schneier on Security | May 23, 2019 at 12:52 PM
Yesterday, I visited the NSA. It was Cyber Command's birthday, but that's not why I was there. I visited as part of the Berklett Cybersecurity Project, run out...Bruce Schneier From Schneier on Security | May 22, 2019 at 03:11 PM
This clever attack allows someone to uniquely identify a phone when you visit a website, based on data from the accelerometer, gyroscope, and magnetometer sensors...Bruce Schneier From Schneier on Security | May 22, 2019 at 07:24 AM
Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story...Bruce Schneier From Schneier on Security | May 21, 2019 at 07:19 AM
This law review article by Noam Kolt, titled "Return on Data," proposes an interesting new way of thinking of privacy law. Abstract: Consumers routinely supply...Bruce Schneier From Schneier on Security | May 20, 2019 at 02:30 PM
Two links. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | May 17, 2019 at 05:13 PM
In March, Adi Shamir -- that's the "S" in RSA -- was denied a US visa to attend the RSA Conference. He's Israeli. This month, British citizen Ross Anderson couldn't...Bruce Schneier From Schneier on Security | May 17, 2019 at 07:18 AM
Last month, Kaspersky discovered that Asus's live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six...Bruce Schneier From Schneier on Security | May 16, 2019 at 02:34 PM
Remember the Spectre and Meltdown attacks from last year? They were a new class of attacks against complex CPUs, finding subliminal channels in optimization techniques...Bruce Schneier From Schneier on Security | May 16, 2019 at 10:28 AM
WhatsApp fixed a devastating vulnerability that allowed someone to remotely hack a phone by initiating a WhatsApp voice call. The recipient didn't even have to...Bruce Schneier From Schneier on Security | May 15, 2019 at 03:22 PM
This is a current list of where and when I am scheduled to speak: I'm speaking on "Securing a World of Physically Capable Computers" at Oxford University on Monday...Bruce Schneier From Schneier on Security | May 14, 2019 at 01:15 PM
A weird paper was posted on the Cryptology ePrint Archive (working link is via the Wayback Machine), claiming an attack against the NSA-designed cipher SIMON. You...Bruce Schneier From Schneier on Security | May 14, 2019 at 07:11 AM
Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. The details are fascinating...Bruce Schneier From Schneier on Security | May 13, 2019 at 07:37 AM
Last Wednesday was a Cephalopod Appreciation Society event in Seattle. I missed it. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | May 10, 2019 at 05:18 PM
A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly...Bruce Schneier From Schneier on Security | May 10, 2019 at 07:30 AM
In 2015, the Intercept started publishing "The Drone Papers," based on classified documents leaked by an unknown whistleblower. Today, someone who worked at the...Bruce Schneier From Schneier on Security | May 9, 2019 at 04:17 PM
Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon's ranking...Bruce Schneier From Schneier on Security | May 9, 2019 at 06:58 AM
In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Most people believe it is a front for...Bruce Schneier From Schneier on Security | May 8, 2019 at 12:30 PM