From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A new dental imagery method, using squid ink, light, and ultrasound. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | September 15, 2017 at 05:07 PM
I recently wrote about the new ability to disable the Touch ID login on iPhones. This is important because of a weirdness in current US law that protects people's...Bruce Schneier From Schneier on Security | September 15, 2017 at 07:28 AM
Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....Bruce Schneier From Schneier on Security | September 14, 2017 at 07:17 AM
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got...Bruce Schneier From Schneier on Security | September 13, 2017 at 01:49 PM
Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear...Bruce Schneier From Schneier on Security | September 13, 2017 at 07:03 AM
A Raspberry Pi is a tiny computer designed for markers and all sorts of Internet-of-Things types of projects. Make magazine has an article about securing it. Reading...Bruce Schneier From Schneier on Security | September 12, 2017 at 07:12 AM
Andrew "bunnie" Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even...Bruce Schneier From Schneier on Security | September 11, 2017 at 07:12 AM
It's Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | September 8, 2017 at 05:11 PM
The ShadowBrokers released the manual for UNITEDRAKE, a sophisticated NSA Trojan that targets Windows machines: Able to compromise Windows PCs running on XP, Windows...Bruce Schneier From Schneier on Security | September 8, 2017 at 07:54 AM
Interesting research from Nature Human Behaviour: "The devoted actor's will to fight and the spiritual dimension of human conflict": Abstract: Frontline investigations...Bruce Schneier From Schneier on Security | September 7, 2017 at 07:05 AM
They're actually Arris routers, sold or given away by AT&T. There are several security vulnerabilities, some of them very serious. They can be fixed, but because...Bruce Schneier From Schneier on Security | September 6, 2017 at 07:55 AM
We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability...Bruce Schneier From Schneier on Security | September 5, 2017 at 04:23 PM
Research paper: "Automated Crowdturfing Attacks and Defenses in Online Review Systems." Abstract: Malicious crowdsourcing forums are gaining traction as sources...Bruce Schneier From Schneier on Security | September 4, 2017 at 08:08 AM
There's a beautiful picture of a tiny squid in this New York Times article on bioluminescence -- and a dramatic one of a vampire squid. As usual, you can also use...Bruce Schneier From Schneier on Security | September 1, 2017 at 05:28 PM
Kaspersky Labs released a highly sophisticated set of hacking tools from Russia called WhiteBear. From February to September 2016, WhiteBear activity was narrowly...Bruce Schneier From Schneier on Security | September 1, 2017 at 07:39 AM
This should come as no surprise: Alas, our findings suggest that secure communications haven't yet attracted mass adoption among journalists. We looked at 2,515...Bruce Schneier From Schneier on Security | August 31, 2017 at 07:52 AM
New paper: "Policy measures and cyber insurance: a framework," by Daniel Woods and Andrew Simpson, Journal of Cyber Policy, 2017. Abstract: The role of the insurance...Bruce Schneier From Schneier on Security | August 30, 2017 at 02:22 PM
New research: "Verified Correctness and Security of mbedTLS HMAC-DRBG," by Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, and...Bruce Schneier From Schneier on Security | August 30, 2017 at 07:37 AM
Interesting post-Snowden reading, just declassified. (U) External Communication will address at least one of "fresh look" narratives: (U) NSA does not access everything...Bruce Schneier From Schneier on Security | August 30, 2017 at 07:15 AM
Ross Anderson gave a talk on the history of the Crypto Wars in the UK. I am intimately familiar with the US story, but didn't know as much about Britain's verson...Bruce Schneier From Schneier on Security | August 29, 2017 at 07:38 AM