From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In a cautionary tale to those who favor government-mandated backdoors to security systems, Microsoft accidentally leaked the key protecting its UEFI Secure boot...Bruce Schneier From Schneier on Security | August 15, 2016 at 07:27 AM
Some minimal information about the NSA's abilities to hack networks via submarine....Bruce Schneier From Schneier on Security | August 12, 2016 at 01:48 PM
Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system...Bruce Schneier From Schneier on Security | August 12, 2016 at 07:52 AM
Here's an interesting hack against a computer's monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor...Bruce Schneier From Schneier on Security | August 11, 2016 at 02:09 PM
We're seeing car thefts in the wild accomplished through hacking: Houston police have arrested two men for a string of high-tech thefts of trucks and SUVs in the...Bruce Schneier From Schneier on Security | August 11, 2016 at 07:32 AM
Scott Atran has done some really interesting research on why ordinary people become terrorists. Academics who study warfare and terrorism typically don't conduct...Bruce Schneier From Schneier on Security | August 10, 2016 at 01:20 PM
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats....Bruce Schneier From Schneier on Security | August 10, 2016 at 07:06 AM
EFF has the story of malware from the Kazakhstan government against "journalists and political activists critical of Kazakhstan's authoritarian government, along...Bruce Schneier From Schneier on Security | August 9, 2016 at 03:14 PM
Citizen Lab has a new report on an Iranian government hacking program that targets dissidents. From a Washington Post op-ed by Ron Deibert: Al-Ameer is a net savvy...Bruce Schneier From Schneier on Security | August 9, 2016 at 06:26 AM
You can order a cocktail made with squid ink soda at Hank's Oyster Bar in Washington, DC....Bruce Schneier From Schneier on Security | August 5, 2016 at 05:22 PM
I've been saying for years that it's bad security advice, that it encourages poor passwords. Lorrie Cranor, now the FTC's chief technologist, agrees: By studying...Bruce Schneier From Schneier on Security | August 5, 2016 at 08:53 AM
The Open Technology Institute of the New America Foundation has released a policy paper on the vulnerabilities equities process: "Bugs in the System: A Primer on...Bruce Schneier From Schneier on Security | August 4, 2016 at 08:25 AM
NIST is no longer recommending two-factor authentication systems that use SMS, because of their many insecurities. In the latest draft of its Digital Authentication...Bruce Schneier From Schneier on Security | August 3, 2016 at 08:11 AM
Last week, President Obama issued a policy directive (PPD-41) on cyber-incident response coordination. The FBI is in charge, which is no surprise. Actually, there's...Bruce Schneier From Schneier on Security | August 2, 2016 at 07:40 AM
Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille's research team revealed a new set of wireless keyboard attacks...Bruce Schneier From Schneier on Security | August 1, 2016 at 04:07 PM