From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Margaret McFall-Ngai studies the symbiotic relationship between squid and the bacteria that live inside them. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | November 6, 2015 at 05:30 PM
Last month, the Cato Institute held its Second Annual Cato Surveillance Conference. It was an excellent event, with many interesting talks and panels. But their...Bruce Schneier From Schneier on Security | November 5, 2015 at 07:16 AM
Interesting paper: "Drops for Stuff: An Analysis of Reshipping Mule Scams. From a blog post: A cybercriminal (called operator) recruits unsuspecting citizens with...Bruce Schneier From Schneier on Security | November 4, 2015 at 02:59 PM
I don't know whether to believe this story. Supposedly the startup Zerodium paid someone $1M for an iOS 9.1 and 9.2b hack. Bekrar and Zerodium, as well as its predecessor...Bruce Schneier From Schneier on Security | November 3, 2015 at 03:31 PM
Australia is going to be the first country to have virtual passports. Presumably, the passport data will be in the cloud somewhere, and you'll access it with an...Bruce Schneier From Schneier on Security | November 3, 2015 at 07:20 AM
Last week, CIA director John O. Brennan became the latest victim of what's become a popular way to embarrass and harass people on the Internet. A hacker allegedly...Bruce Schneier From Schneier on Security | November 2, 2015 at 07:47 AM
First ever examples of a baby giant squid have been found. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | October 30, 2015 at 05:08 PM
"China Unable To Recruit Hackers Fast Enough To Keep Up With Vulnerabilities In U.S. Security Systems." It's only funny because it's true....Bruce Schneier From Schneier on Security | October 30, 2015 at 03:35 PM
In 2009, the Australian government released the Protocol for Lightweight Authentication of Identity (PLAID) protocol. It was recently analyzed (original paper is...Bruce Schneier From Schneier on Security | October 30, 2015 at 07:40 AM
This device is clever: it's a three-digit combination lock that prevents a USB drive from being read. It's not going to keep out anyone serious, but is a great...Bruce Schneier From Schneier on Security | October 29, 2015 at 02:38 PM
Researchers have shown that it is both easy and cheap to surveil connected vehicles. The second link talks about various anonymization techniques, none of which...Bruce Schneier From Schneier on Security | October 29, 2015 at 07:33 AM
In August, I wrote about the NSA's plans to move to quantum-resistant algorithms for its own cryptographic needs. Cryptographers Neal Koblitz and Alfred Menezes...Bruce Schneier From Schneier on Security | October 28, 2015 at 03:11 PM
If the director of the CIA can't keep his e-mail secure, what hope do the rest of us have -- for our e-mail or any of our digital information? None, and that's...Bruce Schneier From Schneier on Security | October 28, 2015 at 07:24 AM
In Data and Goliath, I talk about the need for transparency, oversight, and accountability as the mechanism to allow surveillance when it is necessary, while preserving...Bruce Schneier From Schneier on Security | October 27, 2015 at 10:52 AM
Ravens have been shown to identify and remember cheaters among their unkindness....Bruce Schneier From Schneier on Security | October 26, 2015 at 03:32 PM
Microsoft's President Brad Smith has a blog post discussing what to do now that the US-EU safe-harbor agreement has collapsed. He outlines four steps: First, we...Bruce Schneier From Schneier on Security | October 26, 2015 at 09:40 AM
This paper describes what is almost certainly the most sophisticated chip-and-pin credit card fraud to date. News article. BoingBoing post....Bruce Schneier From Schneier on Security | October 23, 2015 at 07:58 AM