From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Turns out that it's surprisingly easy to game: It appears that news sites deemed legitimate by Google News are being modified by third parties. These sites are...Bruce Schneier From Schneier on Security | June 16, 2017 at 07:42 AM
I hesitate to blog this, because it's an example of everything that's wrong with pop psychology. Malcolm Harris writes about millennials, and has a theory of why...Bruce Schneier From Schneier on Security | June 15, 2017 at 07:52 AM
This article argues that Britain's counterterrorism problem isn't lack of data, it's lack of analysis....Bruce Schneier From Schneier on Security | June 14, 2017 at 02:00 PM
Research paper: "Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone," by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract...Bruce Schneier From Schneier on Security | June 13, 2017 at 07:21 AM
New US government report: "Report on Improving Cybersecurity in the Health Care Industry." It's pretty scathing, but nothing in it will surprise regular readers...Bruce Schneier From Schneier on Security | June 12, 2017 at 10:06 AM
The more they mate, the sooner they die. Academic paper (paywall). News article. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | June 9, 2017 at 05:25 PM
This week brought new public evidence about Russian interference in the 2016 election. On Monday, the Intercept published a top-secret National Security Agency...Bruce Schneier From Schneier on Security | June 9, 2017 at 11:24 AM
Ross Anderson blogged about his new paper on security and safety concerns about the Internet of Things. (See also this short video.) It's very much along the lines...Bruce Schneier From Schneier on Security | June 8, 2017 at 08:15 AM
Interesting law-journal article: "Surveillance Intermediaries," by Alan Z. Rozenshtein. Abstract:Apple's 2016 fight against a court order commanding it to help...Bruce Schneier From Schneier on Security | June 7, 2017 at 07:19 AM
Really interesting research: "Unpacking Spear Phishing Susceptibility," by Zinaida Benenson, Freya Gassmann, and Robert Landwirth. Abstract: We report the results...Bruce Schneier From Schneier on Security | June 6, 2017 at 07:11 AM
WikiLeaks is still dumping CIA cyberweapons on the Internet. Its latest dump is something called "Pandemic": The Pandemic leak does not explain what the CIA's initial...Bruce Schneier From Schneier on Security | June 5, 2017 at 07:16 AM
There's lots of video of squid as undersea predators. This is one of the few instances of squid as prey (from a deep submersible in the Pacific): "We saw brittle...Bruce Schneier From Schneier on Security | June 2, 2017 at 05:05 PM
There is plenty of blame to go around for the WannaCry ransomware that spread throughout the Internet earlier this month, disrupting work at hospitals, factories...Bruce Schneier From Schneier on Security | June 2, 2017 at 07:06 AM
The password-manager 1Password has just implemented a travel mode that tries to protect users while crossing borders. It doesn't make much sense. To enable it,...Bruce Schneier From Schneier on Security | June 1, 2017 at 11:59 AM
Interesting research on a version of RSA that is secure against a quantum computer: Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta...Bruce Schneier From Schneier on Security | May 31, 2017 at 07:31 AM
This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the...Bruce Schneier From Schneier on Security | May 30, 2017 at 01:47 PM
In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of NSA secrets. Since last summer, they've been dumping these...Bruce Schneier From Schneier on Security | May 30, 2017 at 07:08 AM
Last year, I wrote about the potential for doxers to alter documents before they leaked them. It was a theoretical threat when I wrote it, but now Citizen Lab has...Bruce Schneier From Schneier on Security | May 29, 2017 at 11:22 AM