From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Researchers have configured two computers to talk to each other using a laser and a scanner. Scanners work by detecting reflected light on their glass pane. The...Bruce Schneier From Schneier on Security | April 28, 2017 at 01:48 PM
There has been a flurry of research into using the various sensors on your phone to steal data in surprising ways. Here's another: using the phone's ambient light...Bruce Schneier From Schneier on Security | April 28, 2017 at 07:17 AM
Interesting paper: "The rise of reading analytics and the emerging calculus of reading privacy in the digital world," by Clifford Lynch: Abstract: This paper studies...Bruce Schneier From Schneier on Security | April 27, 2017 at 07:20 AM
There's a really interesting new paper analyzing over 100 different cyber insurance policies. From the abstract: In this research paper, we seek to answer fundamental...Bruce Schneier From Schneier on Security | April 26, 2017 at 07:14 AM
Ad blockers represent the largest consumer boycott in human history. They're also an arms race between the blockers and the blocker blockers. This article discusses...Bruce Schneier From Schneier on Security | April 25, 2017 at 01:07 PM
Wow, is this cool. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | April 21, 2017 at 06:04 PM
The US Drug Enforcement Agency has purchased zero-day exploits from the cyberweapons arms manufacturer Hacking Team. BoingBoing post....Bruce Schneier From Schneier on Security | April 20, 2017 at 03:21 PM
This is impressive: The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to...Bruce Schneier From Schneier on Security | April 20, 2017 at 08:41 AM
Researchers build a covert channel between two virtual machines using a shared cache....Bruce Schneier From Schneier on Security | April 18, 2017 at 06:58 AM
Since Edward Snowden revealed to the world the extent of the NSA's global surveillance network, there has been a vigorous debate in the technological community...Bruce Schneier From Schneier on Security | April 17, 2017 at 07:21 AM
In another symptom of climate change, Chile's largest squid producer "plans to diversify its offering in the future, selling sea urchin, cod and octopus, to compensate...Bruce Schneier From Schneier on Security | April 14, 2017 at 05:25 PM
Carnegie Mellon University has released a comprehensive list of C++ secure-coding best practices....Bruce Schneier From Schneier on Security | April 14, 2017 at 08:20 AM
I regularly say that, on the Internet, attack is easier than defense. There are a bunch of reasons for this, but primarily it's 1) the complexity of modern networked...Bruce Schneier From Schneier on Security | April 13, 2017 at 06:45 AM
Interesting paper: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams": Abstract: In technical support scams, cybercriminals attempt to convince...Bruce Schneier From Schneier on Security | April 12, 2017 at 07:34 AM
There's a new malware called BrickerBot that permanently disables vulnerable IoT devices by corrupting their storage capability and reconfiguring kernel parameters...Bruce Schneier From Schneier on Security | April 11, 2017 at 09:22 AM
WikiLeaks is obviously playing their Top Secret CIA data cache for as much press as they can, leaking the documents a little at a time. On Friday they published...Bruce Schneier From Schneier on Security | April 10, 2017 at 03:16 PM
Last August, an unknown group called the Shadow Brokers released a bunch of NSA tools to the public. The common guesses were that the tools were discovered on an...Bruce Schneier From Schneier on Security | April 10, 2017 at 06:51 AM