From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
NIST has published a draft of their new standard for encryption use: "NIST Special Publication 800-175B, Guideline for Using Cryptographic Standards in the Federal...Bruce Schneier From Schneier on Security | March 17, 2016 at 10:54 AM
The FBI's reply to Apple is more of a character assassination attempt than a legal argument. It's as if it only cares about public opinion at this point. Although...Bruce Schneier From Schneier on Security | March 16, 2016 at 07:12 AM
The New York Times is reporting that WhatsApp, and its parent company Facebook, may be headed to court over encrypted chat data that the FBI can't decrypt. This...Bruce Schneier From Schneier on Security | March 15, 2016 at 07:17 AM
Interesting research: "Third-party punishment as a costly signal of trustworthiness, by Jillian J. Jordan, Moshe Hoffman, Paul Bloom,and David G. Rand, Nature:...Bruce Schneier From Schneier on Security | March 14, 2016 at 01:59 PM
This research shows the power of cell phone metadata. From an article by the author: Yemen has experienced an array of violent incidents and political turmoil in...Bruce Schneier From Schneier on Security | March 13, 2016 at 07:32 AM
Really great Tumblr feed. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 11, 2016 at 05:21 PM
Looks like tens of thousands of ISIS documents have been leaked. Where did they come from? We don't know: Documents listing the names of Islamic State fighters...Bruce Schneier From Schneier on Security | March 11, 2016 at 07:17 AM
A Citizen Lab research study of Chinese attack and espionage tactics against Tibetan networks and users. This report describes the latest iteration in a long-running...Bruce Schneier From Schneier on Security | March 10, 2016 at 03:16 PM
New credit card skimmers are hidden inside the card readers, making them impossible to spot....Bruce Schneier From Schneier on Security | March 10, 2016 at 09:26 AM
A group of pirates -- the real kind -- determined which cargo to steal by hacking into a shipping company's database. Here's the report....Bruce Schneier From Schneier on Security | March 8, 2016 at 02:29 PM
Interesting article on detecting cheaters in professional bridge using big-data analysis. Basically, a big part of the game is the communication of information...Bruce Schneier From Schneier on Security | March 8, 2016 at 07:07 AM
New paper: "The Economics of Privacy, by Alessandro Acquisti, Curtis R. Taylor, and Liad Wagman: Abstract: This article summarizes and draws connections among diverse...Bruce Schneier From Schneier on Security | March 7, 2016 at 04:59 PM
A purported giant squid that washed up on the shore in Norfolk, England, is actually a minke whale. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | March 4, 2016 at 05:51 PM
This is the first time I've heard of this clever hack. Bicycle thieves saw through a bicycle rack and then tape it back together, so unsuspecting people chain their...Bruce Schneier From Schneier on Security | March 4, 2016 at 01:02 PM
Thefts of personal information aren't unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of the...Bruce Schneier From Schneier on Security | March 4, 2016 at 06:32 AM
Earlier this week, we learned of yet another attack against SSL/TLS where an attacker can force people to use insecure algorithms. It's called DROWN. Here's a good...Bruce Schneier From Schneier on Security | March 3, 2016 at 03:09 PM
Many wireless keyboards have a security vulnerability that allow someone to hack the computer using the keyboard-computer link. (Technical details here.) An attacker...Bruce Schneier From Schneier on Security | March 3, 2016 at 07:29 AM