From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last month the White House released the "National Cyber Strategy of the United States of America. I generally don't have much to say about these sorts of documents...Bruce Schneier From Schneier on Security | October 9, 2018 at 07:01 AM
Two teenagers figured out how to beat the "Deal or No Deal" arcade game by filming the computer animation than then slowing it down enough to determine where the...Bruce Schneier From Schneier on Security | October 8, 2018 at 06:33 AM
This is an amazing short video of a squid -- I don't know the species -- changing its color instantly. As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | October 5, 2018 at 05:19 PM
Interesting research paper: "Fear the Reaper: Characterization and Fast Detection of Card Skimmers": Abstract: Payment card fraud results in billions of dollars...Bruce Schneier From Schneier on Security | October 5, 2018 at 07:44 AM
Noted conspiracy theorist John McAfee tweeted: The "Presidential alerts": they are capable of accessing the E911 chip in your phones - giving them full access to...Bruce Schneier From Schneier on Security | October 4, 2018 at 04:03 PM
Bloomberg is reporting about a Chinese espionage operating involving inserting a tiny chip into computer products made in China. I've written (alternate link) this...Bruce Schneier From Schneier on Security | October 4, 2018 at 12:30 PM
This is a fantastic Q&A with NYU Law Professor Helen Nissenbaum on data privacy and why it's wrong to focus on consent. I'm not going to pull a quote, because you...Bruce Schneier From Schneier on Security | October 4, 2018 at 07:32 AM
The EU's GDPR regulation requires companies to report a breach within 72 hours. Alex Stamos, former Facebook CISO now at Stanford University, points out how this...Bruce Schneier From Schneier on Security | October 3, 2018 at 04:24 PM
Interesting article on terahertz millimeter-wave scanners and their uses to detect terrorist bombers. The heart of the device is a block of electronics about the...Bruce Schneier From Schneier on Security | October 3, 2018 at 08:11 AM
Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: "never give out any information about yourself in...Bruce Schneier From Schneier on Security | October 2, 2018 at 04:09 PM
From Kashmir Hill: Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact...Bruce Schneier From Schneier on Security | October 2, 2018 at 06:53 AM
Earlier this month, I wrote about a statement by the Five Eyes countries about encryption and back doors. (Short summary: they like them.) One of the weird things...Bruce Schneier From Schneier on Security | October 1, 2018 at 07:22 AM
This is really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 28, 2018 at 05:11 PM
The major tech companies, scared that states like California might impose actual privacy regulations, have now decided that they can better lobby the federal government...Bruce Schneier From Schneier on Security | September 28, 2018 at 02:19 PM
This one is from NIST: "Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others...Bruce Schneier From Schneier on Security | September 27, 2018 at 01:00 PM
Interesting research: In the team's experiments, one WiFi transmitter and one WiFi receiver are behind walls, outside a room in which a number of people are present...Bruce Schneier From Schneier on Security | September 27, 2018 at 08:43 AM
This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital...Bruce Schneier From Schneier on Security | September 25, 2018 at 07:50 AM
If someone has physical access to your shut-down computer, they can probably break the hard-drive's encryption. This is a "cold boot" attack, and one we thought...Bruce Schneier From Schneier on Security | September 24, 2018 at 07:52 AM
On James Island. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 21, 2018 at 05:14 PM
Lots of people are e-mailing me about this new result on the distribution of prime numbers. While interesting, it has nothing to do with cryptography. Cryptographers...Bruce Schneier From Schneier on Security | September 21, 2018 at 03:14 PM