From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Center for Strategic and International Studies (CSIS) published "From Awareness to Action: A Cybersecurity Agenda for the 45th President" (press release here)...Bruce Schneier From Schneier on Security | February 10, 2017 at 01:01 PM
Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data...Bruce Schneier From Schneier on Security | February 10, 2017 at 09:25 AM
Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory...Bruce Schneier From Schneier on Security | February 9, 2017 at 08:14 AM
This online safety guide was written for people concerned about being tracked and stalked online. It's a good resource....Bruce Schneier From Schneier on Security | February 8, 2017 at 02:20 PM
Wired is reporting on a new slot machine hack. A Russian group has reverse-engineered a particular brand of slot machine -- from Austrian company Novomatic -- and...Bruce Schneier From Schneier on Security | February 8, 2017 at 07:48 AM
Here's a nice profile of Citizen Lab and its director, Ron Diebert. Citizen Lab is a jewel. There should be more of them....Bruce Schneier From Schneier on Security | February 7, 2017 at 03:08 PM
The Linux encryption app Cryptkeeper has a rather stunning security bug: the single-character decryption key "p" decrypts everything: The flawed version is in Debian...Bruce Schneier From Schneier on Security | February 7, 2017 at 10:50 AM
In January we learned that a hacker broke into Cellebrite's network and stole 900GB of data. Now the hacker has dumped some of Cellebrite's phone-hacking tools...Bruce Schneier From Schneier on Security | February 6, 2017 at 07:30 AM
A whale recently died in Norway because there were thirty plastic bags in its stomach. Researchers believe it may have mistaken the plastic bags for squid. As usual...Bruce Schneier From Schneier on Security | February 3, 2017 at 06:25 PM
Here's an article about the US Secret Service and their Cell Phone Forensics Facility in Tulsa. I said it before and I'll say it again: the FBI needs technical...Bruce Schneier From Schneier on Security | February 3, 2017 at 11:39 AM
Here's a story about data from a pacemaker being used as evidence in an arson conviction....Bruce Schneier From Schneier on Security | February 2, 2017 at 07:33 AM
Last year, on October 21, your digital video recorder - or at least a DVR like yours - knocked Twitter off the internet. Someone used your DVR, along with millions...Bruce Schneier From Schneier on Security | February 1, 2017 at 09:05 AM
Attackers held an Austrian hotel network for ransom, demanding $1800 in Bitcoin to unlock the network. Among other things, the locked network wouldn't allow any...Bruce Schneier From Schneier on Security | January 31, 2017 at 09:49 AM
Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US. Here's the relevant...Bruce Schneier From Schneier on Security | January 30, 2017 at 07:04 AM
New fossil bed discovered in Alberta: The finds at the site include 16 vampyropods, a relative of the vampire squid with its ink sac and fine details of its muscles...Bruce Schneier From Schneier on Security | January 27, 2017 at 05:37 PM
There are a lot of them. In a world where the number of fans, friends, followers, and likers are social currency -- and where the number of reposts is a measure...Bruce Schneier From Schneier on Security | January 27, 2017 at 07:18 AM
Mike Specter has an interesting idea on how to make biometric access-control systems more secure: add a duress code. For example, you might configure your iPhone...Bruce Schneier From Schneier on Security | January 26, 2017 at 03:03 PM
Reports are that President Trump is still using his old Android phone. There are security risks here, but they are not the obvious ones. I'm not concerned about...Bruce Schneier From Schneier on Security | January 26, 2017 at 08:06 AM
Interesting research -- "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization...Bruce Schneier From Schneier on Security | January 25, 2017 at 07:18 AM
Good article that crunches the data and shows that the press's coverage of terrorism is disproportional to its comparative risk. This isn't new. I've written about...Bruce Schneier From Schneier on Security | January 24, 2017 at 07:31 AM