From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Yesterday at the RSA Conference, I gave a keynote talk about the role of public-interest technologists in cybersecurity. (Video here). I also hosted a one-day mini...Bruce Schneier From Schneier on Security | March 8, 2019 at 03:24 PM
This will complicate things: To complicate matters, having cyber insurance might not cover everyone's losses. Zurich American Insurance Company refused to pay out...Bruce Schneier From Schneier on Security | March 8, 2019 at 06:57 AM
This system claims to detect suspicious behavior that indicates shoplifting: Vaak, a Japanese startup, has developed artificial intelligence software that hunts...Bruce Schneier From Schneier on Security | March 7, 2019 at 02:48 PM
Researchers have demonstrated spoofing of digital signatures in PDF files. This would matter more if PDF digital signatures were widely used. Still, the researchers...Bruce Schneier From Schneier on Security | March 6, 2019 at 07:17 AM
The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices...Bruce Schneier From Schneier on Security | March 5, 2019 at 07:31 AM
The Nest home alarm system shipped with a secret microphone, which -- according to the company -- was only an accidental secret: On Tuesday, a Google spokesperson...Bruce Schneier From Schneier on Security | March 4, 2019 at 07:04 AM
China is building the largest squid processing center in the world. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | March 1, 2019 at 05:24 PM
Matthew Green has a super-interesting blog post about information leakage from encrypted databases. It describes the recent work by Paul Grubbs, Marie-Sarah Lacharit...Bruce Schneier From Schneier on Security | March 1, 2019 at 06:59 AM
After years of claiming that the Terrorist Screening Database is kept secret within the government, we have now learned that the DHS shares it "with more than 1...Bruce Schneier From Schneier on Security | February 28, 2019 at 07:22 AM
Notice this bit from an article on the arrest of Christopher Hasson: It was only after Hasson's arrest last Friday at his workplace that the chilling plans prosecutors...Bruce Schneier From Schneier on Security | February 27, 2019 at 07:22 AM
A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country...Bruce Schneier From Schneier on Security | February 26, 2019 at 07:10 AM
There's new research on the security of password managers, speficially 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage...Bruce Schneier From Schneier on Security | February 25, 2019 at 07:23 AM
Really: After years of "making do" with the available technology for his squid studies, Mooney created a versatile tag that allows him to research squid behavior...Bruce Schneier From Schneier on Security | February 22, 2019 at 05:09 PM
Really interesting article by and interview with Paul M. Nakasone (Commander of U.S. Cyber Command, Director of the National Security Agency, and Chief of the Central...Bruce Schneier From Schneier on Security | February 22, 2019 at 06:35 AM
The police are increasingly getting search warrants for information about all cellphones in a certain location at a certain time: Police departments across the...Bruce Schneier From Schneier on Security | February 21, 2019 at 07:33 AM
At the end of January the US Department of Homeland Security issued a warning regarding serious DNS hijacking attempts against US government domains. Brian Krebs...Bruce Schneier From Schneier on Security | February 20, 2019 at 09:02 AM
Interesting -- although short and not very detailed -- article about Estonia's volunteer cyber-defense militia. Padar's militia of amateur IT workers, economists...Bruce Schneier From Schneier on Security | February 19, 2019 at 07:36 AM
It seems that someone from a company called Swift Recovery Ltd. is impersonating me -- at least on Telegram. The person is using a photo of me, and is using details...Bruce Schneier From Schneier on Security | February 18, 2019 at 03:42 PM
Recent articles about IoT vulnerabilities describe hacking of construction cranes, supermarket freezers, and electric scooters....Bruce Schneier From Schneier on Security | February 18, 2019 at 08:45 AM