From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Earlier this week, the New York Times reported that the Russians and the Chinese were eavesdropping on President Donald Trump's personal cell phone and using the...Bruce Schneier From Schneier on Security | October 30, 2018 at 07:38 AM
I've blogged twice about the Bloomberg story that China bugged Supermicro networking equipment destined to the US. We still don't know if the story is true, although...Bruce Schneier From Schneier on Security | October 29, 2018 at 04:19 PM
This seems bad: The F25 software was found to contain a capture replay vulnerability -- basically an attacker would be able to eavesdrop on radio transmissions...Bruce Schneier From Schneier on Security | October 29, 2018 at 07:18 AM
Two New Yorkers have been charged with importing squid from Peru and then reselling it as octopus. Yet another problem that a blockchain-enabled supply-chain system...Bruce Schneier From Schneier on Security | October 26, 2018 at 05:02 PM
This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if...Bruce Schneier From Schneier on Security | October 26, 2018 at 10:01 AM
BuzzFeed is reporting on a scheme where fraudsters buy legitimate Android apps, track users' behavior in order to mimic it in a way that evades bot detectors, and...Bruce Schneier From Schneier on Security | October 25, 2018 at 07:49 AM
This is a long -- and somewhat technical -- paper by Chris C. Demchak and Yuval Shavitt about China's repeated hacking of the Internet Border Gateway Protocol (BGP)...Bruce Schneier From Schneier on Security | October 24, 2018 at 07:00 AM
IoT devices are surveillance devices, and manufacturers generally use them to collect data on their customers. Surveillance is still the business model of the Internet...Bruce Schneier From Schneier on Security | October 22, 2018 at 09:13 AM
Recipe and commentary. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | October 19, 2018 at 05:00 PM
This is crazy (and dangerous). West Virginia is allowing people to vote via a smart-phone app. Even crazier, the app uses blockchain -- presumably because they...Bruce Schneier From Schneier on Security | October 19, 2018 at 07:17 AM
This is an interesting interview with a former NSA employee about supply chain security. I consider this to be an insurmountable problem right now....Bruce Schneier From Schneier on Security | October 18, 2018 at 07:27 AM
Ross Anderson has some new work: As mobile phone masts went up across the world's jungles, savannas and mountains, so did poaching. Wildlife crime syndicates can...Bruce Schneier From Schneier on Security | October 16, 2018 at 07:04 AM
If you're an American of European descent, there's a 60% you can be uniquely identified by public information in DNA databases. This is not information that you...Bruce Schneier From Schneier on Security | October 15, 2018 at 10:34 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at Data in Smarter Cities in New York City on October 23, 2018. I'm speaking at the...Bruce Schneier From Schneier on Security | October 14, 2018 at 07:01 AM
The UK's Marine Conservation Society is urging people to eat less squid. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | October 12, 2018 at 05:01 PM
It's no secret that computers are insecure. Stories like the recent Facebook hack, the Equifax hack and the hacking of government agencies are remarkable for how...Bruce Schneier From Schneier on Security | October 12, 2018 at 09:14 AM
Bloomberg has another story about hardware surveillance implants in equipment made in China. This implant is different from the one Bloomberg reported on last week...Bruce Schneier From Schneier on Security | October 11, 2018 at 07:29 AM
The US Government Accounting Office just published a new report: "Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities" (summary...Bruce Schneier From Schneier on Security | October 10, 2018 at 07:21 AM
The international digital human rights organization Access Now (I am on the board) is looking to hire a Chief Security Officer. I believe that, somewhere, there...Bruce Schneier From Schneier on Security | October 9, 2018 at 03:32 PM