From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream -- and the...Bruce Schneier From Schneier on Security | October 26, 2016 at 07:38 AM
I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the...Bruce Schneier From Schneier on Security | October 24, 2016 at 03:12 PM
Josephine Wolff examines different Internet governance stakeholders and how they frame security debates. Her conclusion: The tensions that arise around issues of...Bruce Schneier From Schneier on Security | October 24, 2016 at 07:03 AM
Yesterday's DDoS attacks against Dyn are being reported everywhere. I have received a gazillion press requests, but I am traveling in Australia and Asia and have...Bruce Schneier From Schneier on Security | October 22, 2016 at 09:47 AM
Interesting article listing the squid species that can still be ethically eaten. The problem, of course, is that on a restaurant menu it's just labeled "squid."...Bruce Schneier From Schneier on Security | October 21, 2016 at 05:00 PM
Interesting interview: Obama: Traditionally, when we think about security and protecting ourselves, we think in terms of armor or walls. Increasingly, I find myself...Bruce Schneier From Schneier on Security | October 20, 2016 at 07:16 AM
Researchers discover a clever attack that bypasses the address space layout randomization (ALSR) on Intel's CPUs. Here's the paper. It discusses several possible...Bruce Schneier From Schneier on Security | October 19, 2016 at 03:19 PM
Lance Spitzner looks at the safety features of a power saw and tries to apply them to Internet security: By the way, here are some of the key safety features that...Bruce Schneier From Schneier on Security | October 19, 2016 at 07:45 AM
Former NSA attorneys John DeLong and Susan Hennessay have written a fascinating article describing a particular incident of oversight failure inside the NSA. Technically...Bruce Schneier From Schneier on Security | October 18, 2016 at 03:29 PM
This is a harrowing story of a scam artist that convinced a mother that her daughter had been kidnapped. More stories are here. It's unclear if these virtual kidnappers...Bruce Schneier From Schneier on Security | October 17, 2016 at 07:28 AM
Squid ink risotto is a good accompaniment for any mild fish. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | October 14, 2016 at 05:20 PM
On today's Internet, too much power is concentrated in too few hands. In the early days of the Internet, individuals were empowered. Now governments and corporations...Bruce Schneier From Schneier on Security | October 14, 2016 at 07:20 AM
Richard Thieme gave a talk on the psychological impact of doing classified intelligence work. Summary here...Bruce Schneier From Schneier on Security | October 12, 2016 at 07:43 AM
You can edit anyone's information you want: The question, boiled down, was haunting: Want to see how easy it would be to get into someone's voter registration and...Bruce Schneier From Schneier on Security | October 11, 2016 at 03:04 PM
Interesting research in Nature. The article is behind a paywall, but here are five summaries of the research....Bruce Schneier From Schneier on Security | October 11, 2016 at 06:51 AM
Brian Krebs is a popular reporter on the cybersecurity beat. He regularly exposes cybercriminals and their tactics, and consequently is regularly a target of their...Bruce Schneier From Schneier on Security | October 10, 2016 at 11:26 AM
All cephalopods are colorblind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 7, 2016 at 05:37 PM