From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting story about Uber drivers who have figured out how to game the company's algorithms to cause surge pricing: According to the study. drivers manipulate...Bruce Schneier From Schneier on Security | August 8, 2017 at 10:35 AM
Interesting story: The venture is built on Alex's talent for reverse engineering the algorithms -- known as pseudorandom number generators, or PRNGs -- that govern...Bruce Schneier From Schneier on Security | August 7, 2017 at 07:00 AM
I never imagined that there would be fake news about squid. (That website lets you write your own stories.) As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | August 4, 2017 at 05:24 PM
Attackers used a vulnerability in an Internet-connected fish tank to successfully penetrate a casino's network. BoingBoing post....Bruce Schneier From Schneier on Security | August 4, 2017 at 07:22 AM
Rumor is that the Trump administration will separate the NSA and US Cyber Command. I have long thought this was a good idea. Here's a good discussion of what it...Bruce Schneier From Schneier on Security | August 3, 2017 at 07:29 AM
Last week, DefCon hosted a "Voter Hacker Village" event. Every single voting machine there was easily hackable. Here are detailed details. There should be a summary...Bruce Schneier From Schneier on Security | August 2, 2017 at 01:59 PM
Researchers are developing technologies that can detect IMSI-catchers: those fake cell phone towers that can be used to surveil people in the area. This is good...Bruce Schneier From Schneier on Security | August 2, 2017 at 08:39 AM
Back in 2013, Der Spiegel reported that the NSA intercepts and collects Windows bug reports: One example of the sheer creativity with which the TAO spies approach...Bruce Schneier From Schneier on Security | August 1, 2017 at 07:00 AM
Articles about serious vulnerabilities in IoT devices and embedded systems are now dime-a-dozen. This one concerns Internet-connected car washes: A group of security...Bruce Schneier From Schneier on Security | August 1, 2017 at 06:47 AM
Robots can crack safes faster than humans -- and differently: So Seidle started looking for shortcuts. First he found that, like many safes, his SentrySafe had...Bruce Schneier From Schneier on Security | July 31, 2017 at 01:19 PM
New paper: "Taking Stock: Estimating Vulnerability Rediscovery," by Trey Herr, Bruce Schneier, and Christopher Morris: Abstract: How often do multiple, independent...Bruce Schneier From Schneier on Security | July 31, 2017 at 06:59 AM
New research: In this study, the optic lobe of a giant squid (Architeuthis dux, male, mantle length 89 cm), which was caught by local fishermen off the northeastern...Bruce Schneier From Schneier on Security | July 28, 2017 at 05:00 PM
I attended the National Restaurant Association exposition in Chicago earlier this year, and looked at all the ways modern restaurant IT is spying on people. But...Bruce Schneier From Schneier on Security | July 28, 2017 at 03:20 PM
In April, the Shadow Brokers -- presumably Russia -- released a batch of Windows exploits from what is presumably the NSA. Included in that release were eight different...Bruce Schneier From Schneier on Security | July 28, 2017 at 07:16 AM
The Armatix IP1 "smart gun" can only be fired by someone who is wearing a special watch. Unfortunately, this security measure is easily hackable....Bruce Schneier From Schneier on Security | July 27, 2017 at 07:14 AM
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects....Bruce Schneier From Schneier on Security | July 26, 2017 at 07:06 AM
Policy essay: "Encryption Substitutes," by Andrew Keane Woods: In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I...Bruce Schneier From Schneier on Security | July 25, 2017 at 07:52 AM
The US Army Research Agency is funding research into autonomous bot swarms. From the announcement: The objective of this CRA is to perform enabling basic and applied...Bruce Schneier From Schneier on Security | July 24, 2017 at 07:39 AM
It's the second in two months. Video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...Bruce Schneier From Schneier on Security | July 21, 2017 at 05:33 PM
The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number...Bruce Schneier From Schneier on Security | July 21, 2017 at 07:23 AM