From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is just plain weird: Rosenthal, a neurobiologist at the Marine Biological Laboratory, was a grad student studying a specific protein in squid when he got an...Bruce Schneier From Schneier on Security | April 7, 2017 at 05:16 PM
NSA Deputy Director Richard Ledgett described a 2014 Russian cyber attack against the U.S. State Department as "hand-to-hand" combat: "It was hand-to-hand combat...Bruce Schneier From Schneier on Security | April 7, 2017 at 09:06 AM
There's ablog post from Google's Project Zero detailing an attack against Android phones over Wi-Fi. From Ars Technica: The vulnerability resides in a widely used...Bruce Schneier From Schneier on Security | April 6, 2017 at 08:52 AM
There's a new report of a nation-state attack, presumed to be from China, on a series of managed ISPs. From the executive summary: Since late 2016, PwC UK and BAE...Bruce Schneier From Schneier on Security | April 5, 2017 at 11:42 AM
This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack...Bruce Schneier From Schneier on Security | April 5, 2017 at 07:29 AM
Interesting law journal article: "Encryption and the Press Clause," by D. Victoria Barantetsky. Abstract: Almost twenty years ago, a hostile debate over whether...Bruce Schneier From Schneier on Security | April 4, 2017 at 03:14 PM
Interesting acoustic attack against the MEMS accelerometers in devices like FitBits. Millions of accelerometers reside inside smartphones, automobiles, medical...Bruce Schneier From Schneier on Security | April 4, 2017 at 07:23 AM
Not content with having a fleet of insecure surveillance drones, the state of Connecticut wants a fleet of insecure weaponized drones. What could possibly go wrong...Bruce Schneier From Schneier on Security | April 3, 2017 at 07:30 AM
Great Victorian animal-combat scene featuring a giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | March 31, 2017 at 05:29 PM
Think about all of the websites you visit every day. Now imagine if the likes of Time Warner, AT&T, and Verizon collected all of your browsing history and sold...Bruce Schneier From Schneier on Security | March 31, 2017 at 01:07 PM
Last month at the RSA Conference, I saw a lot of companies selling security incident response automation. Their promise was to replace people with computers --...Bruce Schneier From Schneier on Security | March 29, 2017 at 07:16 AM
Kalyna is a block cipher that became a Ukrainian national standard in 2015. It supports block and key sizes of 128, 256, and 512 bits. Its structure looks like...Bruce Schneier From Schneier on Security | March 28, 2017 at 07:26 AM
Last Monday, the TSA announced a peculiar new security measure to take effect within 96 hours. Passengers flying into the US on foreign airlines from eight Muslim...Bruce Schneier From Schneier on Security | March 27, 2017 at 07:28 AM
Available on eBay. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 24, 2017 at 05:06 PM
Over the past few months, I have been watching my blog comments decline in civility. I blame it in part on the contentious US election and its aftermath. It's also...Bruce Schneier From Schneier on Security | March 24, 2017 at 03:20 PM
There are more CIA documents up on WikiLeaks. It seems to be mostly MacOS and iOS. News article....Bruce Schneier From Schneier on Security | March 24, 2017 at 07:46 AM
Turkish hackers are threatening to erase millions of iCloud user accounts unless Apple pays a ransom. This is a weird story, and I'm skeptical of some of the details...Bruce Schneier From Schneier on Security | March 23, 2017 at 10:09 AM
Every year, the NSA has a competition for the best cybersecurity paper. Winners get to go to the NSA to pick up the award. (Warning: you will almost certainly be...Bruce Schneier From Schneier on Security | March 22, 2017 at 01:17 PM