From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The 16th Workshop on Economics and Information Security was this week. Ross Anderson liveblogged the talks....Bruce Schneier From Schneier on Security | June 30, 2017 at 03:13 PM
Fortune magazine just published a good article about Google's Project Zero, which finds and publishes exploits in other companies' software products. I have mixed...Bruce Schneier From Schneier on Security | June 30, 2017 at 07:05 AM
Really good article about the women who worked at Bletchley Park during World War II, breaking German Enigma-encrypted messages....Bruce Schneier From Schneier on Security | June 29, 2017 at 01:40 PM
Websites are sending information prematurely: ...we discovered NaviStone's code on sites run by Acurian, Quicken Loans, a continuing education center, a clothing...Bruce Schneier From Schneier on Security | June 29, 2017 at 07:51 AM
The Girl Scouts are going to be offering 18 merit badges in cybersecurity, to scouts as young as five years old....Bruce Schneier From Schneier on Security | June 28, 2017 at 01:56 PM
WikiLeaks has published CherryBlossom, the CIA's program to hack into wireless routers. The program is about a decade old. Four good news articles. Five. And a...Bruce Schneier From Schneier on Security | June 28, 2017 at 06:35 AM
Apple is fighting its own battle against leakers, using people and tactics from the NSA. According to the hour-long presentation, Apple's Global Security team employs...Bruce Schneier From Schneier on Security | June 27, 2017 at 07:25 AM
Sad story of someone whose computer became owned by a griefer: The trouble began last year when he noticed strange things happening: files went missing from his...Bruce Schneier From Schneier on Security | June 26, 2017 at 01:30 PM
In a proposed rule by the FAA, it argues that software in an Embraer S.A. Model ERJ 190-300 airplane is secure because it's proprietary: In addition, the operating...Bruce Schneier From Schneier on Security | June 26, 2017 at 07:59 AM
A paddleboarder had a run-in with an injured giant squid. Video. Here's the real story. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | June 23, 2017 at 05:23 PM
Interesting: As codes go, Potter's wasn't inordinately complicated. As Wiltshire explains, it was a "mono-alphabetic substitution cipher code," in which each letter...Bruce Schneier From Schneier on Security | June 23, 2017 at 02:57 PM
Amazon has been issued a patent on security measures that prevents people from comparison shopping while in the store. It's not a particularly sophisticated patent...Bruce Schneier From Schneier on Security | June 23, 2017 at 07:26 AM
According to a recently declassified report obtained under FOIA, the NSA's attempts to protect itself against insider attacks aren't going very well: The N.S.A....Bruce Schneier From Schneier on Security | June 22, 2017 at 06:52 AM
Last week, Microsoft issued a security patch for Windows XP, a 16-year-old operating system that Microsoft officially no longer supports. Last month, Microsoft...Bruce Schneier From Schneier on Security | June 21, 2017 at 02:58 PM
Last week, the Department of Justice released 18 new FISC opinions related to Section 702 as part of an EFF FOIA lawsuit. (Of course, they don't mention EFF or...Bruce Schneier From Schneier on Security | June 21, 2017 at 07:12 AM
I have no comment on the politics of this stabbing attack, and only note that the attacker used a ceramic knife -- that will go through metal detectors. I have...Bruce Schneier From Schneier on Security | June 20, 2017 at 07:21 AM
Access Now has documented it being used against a Twitter user, but it also works against other social media accounts: With the Doubleswitch attack, a hijacker...Bruce Schneier From Schneier on Security | June 19, 2017 at 07:44 AM
An early preview. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | June 16, 2017 at 05:14 PM
There's evidence: Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol...Bruce Schneier From Schneier on Security | June 16, 2017 at 03:11 PM