From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Really good investigative reporting on the automatic algorithms used to predict recidivism rates....Bruce Schneier From Schneier on Security | June 8, 2016 at 02:14 PM
Lots of details that demonstrate that Snowden did try to raise his concerns internally before going public, and that the NSA lied about this....Bruce Schneier From Schneier on Security | June 8, 2016 at 07:44 AM
New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...Bruce Schneier From Schneier on Security | June 7, 2016 at 03:59 PM
There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...Bruce Schneier From Schneier on Security | June 6, 2016 at 07:10 AM
Earlier this week, I was at the ninth Workshop on Security and Human Behavior, hosted at Harvard University. SHB is a small invitational gathering of people studying...Bruce Schneier From Schneier on Security | June 3, 2016 at 02:36 PM
There's a new piece of malware called Irongate, which is obviously inspired by Stuxnet. We don't know who is responsible for it. Slashdot thread....Bruce Schneier From Schneier on Security | June 3, 2016 at 07:33 AM
Citizen Lab has the details: This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call Stealth Falcon....Bruce Schneier From Schneier on Security | June 2, 2016 at 08:49 AM
This is a good summary article on the fallibility of DNA evidence. Most interesting to me are the parts on the proprietary algorithms used in DNA matching: William...Bruce Schneier From Schneier on Security | May 31, 2016 at 02:04 PM
A proposed law in Albany, NY, would make it a crime to walk away from airport screening. Aside from wondering why county lawmakers are getting involved with what...Bruce Schneier From Schneier on Security | May 31, 2016 at 07:35 AM
People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...Bruce Schneier From Schneier on Security | May 30, 2016 at 11:10 AM
This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...Bruce Schneier From Schneier on Security | May 27, 2016 at 05:28 PM
Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...Bruce Schneier From Schneier on Security | May 27, 2016 at 07:19 AM
Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...Bruce Schneier From Schneier on Security | May 26, 2016 at 07:31 AM
There's a new trend in Silicon Valley startups; companies are not collecting and saving data on their customers: In Silicon Valley, there's a new emphasis on putting...Bruce Schneier From Schneier on Security | May 25, 2016 at 03:37 PM
Good debate in the Wall Street Journal. This isn't an obvious one; there are good arguments on both sides....Bruce Schneier From Schneier on Security | May 25, 2016 at 06:58 AM
This is good news: Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities...Bruce Schneier From Schneier on Security | May 24, 2016 at 03:12 PM
Google is trying to bring this to Android developers by the end of the year: Today, secure logins -- like those used by banks or in the enterprise environment -...Bruce Schneier From Schneier on Security | May 24, 2016 at 09:35 AM