From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Wow, is this cool. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | April 21, 2017 at 06:04 PM
The US Drug Enforcement Agency has purchased zero-day exploits from the cyberweapons arms manufacturer Hacking Team. BoingBoing post....Bruce Schneier From Schneier on Security | April 20, 2017 at 03:21 PM
This is impressive: The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to...Bruce Schneier From Schneier on Security | April 20, 2017 at 08:41 AM
Researchers build a covert channel between two virtual machines using a shared cache....Bruce Schneier From Schneier on Security | April 18, 2017 at 06:58 AM
Since Edward Snowden revealed to the world the extent of the NSA's global surveillance network, there has been a vigorous debate in the technological community...Bruce Schneier From Schneier on Security | April 17, 2017 at 07:21 AM
In another symptom of climate change, Chile's largest squid producer "plans to diversify its offering in the future, selling sea urchin, cod and octopus, to compensate...Bruce Schneier From Schneier on Security | April 14, 2017 at 05:25 PM
Carnegie Mellon University has released a comprehensive list of C++ secure-coding best practices....Bruce Schneier From Schneier on Security | April 14, 2017 at 08:20 AM
I regularly say that, on the Internet, attack is easier than defense. There are a bunch of reasons for this, but primarily it's 1) the complexity of modern networked...Bruce Schneier From Schneier on Security | April 13, 2017 at 06:45 AM
Interesting paper: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams": Abstract: In technical support scams, cybercriminals attempt to convince...Bruce Schneier From Schneier on Security | April 12, 2017 at 07:34 AM
There's a new malware called BrickerBot that permanently disables vulnerable IoT devices by corrupting their storage capability and reconfiguring kernel parameters...Bruce Schneier From Schneier on Security | April 11, 2017 at 09:22 AM
WikiLeaks is obviously playing their Top Secret CIA data cache for as much press as they can, leaking the documents a little at a time. On Friday they published...Bruce Schneier From Schneier on Security | April 10, 2017 at 03:16 PM
Last August, an unknown group called the Shadow Brokers released a bunch of NSA tools to the public. The common guesses were that the tools were discovered on an...Bruce Schneier From Schneier on Security | April 10, 2017 at 06:51 AM
This is just plain weird: Rosenthal, a neurobiologist at the Marine Biological Laboratory, was a grad student studying a specific protein in squid when he got an...Bruce Schneier From Schneier on Security | April 7, 2017 at 05:16 PM
NSA Deputy Director Richard Ledgett described a 2014 Russian cyber attack against the U.S. State Department as "hand-to-hand" combat: "It was hand-to-hand combat...Bruce Schneier From Schneier on Security | April 7, 2017 at 09:06 AM
There's ablog post from Google's Project Zero detailing an attack against Android phones over Wi-Fi. From Ars Technica: The vulnerability resides in a widely used...Bruce Schneier From Schneier on Security | April 6, 2017 at 08:52 AM
There's a new report of a nation-state attack, presumed to be from China, on a series of managed ISPs. From the executive summary: Since late 2016, PwC UK and BAE...Bruce Schneier From Schneier on Security | April 5, 2017 at 11:42 AM
This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack...Bruce Schneier From Schneier on Security | April 5, 2017 at 07:29 AM