From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The National Academies has just published "Decrypting the Encryption Debate: A Framework for Decision Makers." It looks really good, although I have not read it...Bruce Schneier From Schneier on Security | February 16, 2018 at 10:17 AM
Good Washington Post op-ed on the need to use voter-verifiable paper ballots to secure elections, as well as risk-limiting audits....Bruce Schneier From Schneier on Security | February 15, 2018 at 10:14 AM
Everything online is hackable. This is true for Equifax's data and the federal Office of Personal Management's data, which was hacked in 2015. If information is...Bruce Schneier From Schneier on Security | February 14, 2018 at 07:43 AM
Nice profile of Mordechai Guri, who researches a variety of clever ways to steal data over air-gapped computers. Guri and his fellow Ben-Gurion researchers have...Bruce Schneier From Schneier on Security | February 13, 2018 at 07:26 AM
There are a lot: The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related...Bruce Schneier From Schneier on Security | February 12, 2018 at 07:36 AM
Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | February 9, 2018 at 05:17 PM
In "The House that spied on Me," Kashmir Hill outfits her home to be as "smart" as possible and writes about the results....Bruce Schneier From Schneier on Security | February 9, 2018 at 08:59 AM
A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine...Bruce Schneier From Schneier on Security | February 8, 2018 at 12:55 PM
This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is...Bruce Schneier From Schneier on Security | February 7, 2018 at 07:19 AM
The Guardian is reporting that "every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required." This is the same NHS that...Bruce Schneier From Schneier on Security | February 6, 2018 at 07:33 AM
Pretty, but contains no actual squid ingredients. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | February 2, 2018 at 05:36 PM
Stuxnet famously used legitimate digital certificates to sign its malware. A research paper from last year found that the practice is much more common than previously...Bruce Schneier From Schneier on Security | February 2, 2018 at 07:38 AM
Brian Krebs is reporting sophisticated jackpotting attacks against US ATMs. The attacker gains physical access to the ATM, plants malware using specialized electronics...Bruce Schneier From Schneier on Security | February 1, 2018 at 07:23 AM
According to this story (non-paywall English version here), Israeli scientists released some information to the public they shouldn't have. Defense establishment...Bruce Schneier From Schneier on Security | January 31, 2018 at 03:37 PM
For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. We've just lost an important battle...Bruce Schneier From Schneier on Security | January 31, 2018 at 07:06 AM
Local residents are opposing adding an elevator to a subway station because terrorists might use it to detonate a bomb. No, really. There's no actual threat analysis...Bruce Schneier From Schneier on Security | January 30, 2018 at 07:26 AM
In November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app. Over this weekend, someone...Bruce Schneier From Schneier on Security | January 29, 2018 at 03:17 PM
It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to...Bruce Schneier From Schneier on Security | January 29, 2018 at 07:18 AM
The mating and death characteristics of some squid are fascinating. Research paper. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | January 26, 2018 at 05:23 PM