From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Almost 20 years ago, I wrote a paper that pointed to a potential flaw in the ANSI X9.17 RNG standard. Now, new research has found that the flaw exists in some implementations...Bruce Schneier From Schneier on Security | October 31, 2017 at 11:29 AM
Google has a new login service for high-risk users. it's good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data...Bruce Schneier From Schneier on Security | October 30, 2017 at 01:23 PM
Researchers in the British Virgin Islands have sunk a giant squid made out of steel mesh to serve as an artificial reef. As usual, you can also use this squid post...Bruce Schneier From Schneier on Security | October 27, 2017 at 05:28 PM
Earlier this month, Deputy Attorney General Rod Rosenstein gave a speech warning that a world with encryption is a world without law -- or something like that....Bruce Schneier From Schneier on Security | October 27, 2017 at 03:45 PM
Fascinating article about two psychologists who are studying interrogation techniques. Now, two British researchers are quietly revolutionising the study and practice...Bruce Schneier From Schneier on Security | October 26, 2017 at 06:09 AM
The Communications Security Establishment of Canada -- basically, Canada's version of the NSA -- has released a suite of malware analysis tools: Assemblyline is...Bruce Schneier From Schneier on Security | October 25, 2017 at 07:07 AM
It's based on the Mirai code, but much more virulent: While Mirai caused widespread outages, it impacted IP cameras and internet routers by simply exploiting their...Bruce Schneier From Schneier on Security | October 24, 2017 at 07:01 AM
Hacking back is a terrible idea that just will not die. Josephine Wolff takes apart the new hacking back bill that was introduced in the House recently....Bruce Schneier From Schneier on Security | October 23, 2017 at 07:16 AM
Interesting essay by Danna Staaf, the author of Squid Empire. (I mentioned the book two weeks ago.) As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | October 20, 2017 at 05:24 PM
Denuvo is probably the best digital-rights management system, used to protect computer games. It's regularly cracked within a day. If Denuvo can no longer provide...Bruce Schneier From Schneier on Security | October 20, 2017 at 10:17 AM
The Norwegian Security Council has published a report detailing a series of security and privacy flaws in smart watches marketed to children. Press release. News...Bruce Schneier From Schneier on Security | October 19, 2017 at 10:18 AM
In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece...Bruce Schneier From Schneier on Security | October 18, 2017 at 10:58 AM
A security flaw in Infineon smart cards and TPMs allows an attacker to recover private keys from the public keys. Basically, the key generation algorithm sometimes...Bruce Schneier From Schneier on Security | October 17, 2017 at 10:24 AM
Mathy Vanhoef has just published a devastating attack against WPA2, the 14-year-old encryption protocol used by pretty much all wi-fi systems. Its an interesting...Bruce Schneier From Schneier on Security | October 16, 2017 at 09:39 AM
It's International Cephalopod Awareness Days this week, and Tuesday was Squid Day. I can't believe I missed it. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | October 13, 2017 at 05:26 PM
Blog regulars will notice that I haven't been posting as much lately as I have in the past. There are two reasons. One, it feels harder to find things to write...Bruce Schneier From Schneier on Security | October 13, 2017 at 03:13 PM
Two related stories: PornHub is using machine learning algorithms to identify actors in different videos, so as to better index them. People are worried that it...Bruce Schneier From Schneier on Security | October 13, 2017 at 07:57 AM
This is an interesting security vulnerability: because it is so easy to impersonate iOS password prompts, a malicious app can steal your password just by asking...Bruce Schneier From Schneier on Security | October 12, 2017 at 07:43 AM
Both the New York Times and the Washington Post are reporting that Israel has penetrated Kaspersky's network and detected the Russian operation. From the New York...Bruce Schneier From Schneier on Security | October 11, 2017 at 03:54 PM