From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A worker in Amazon's packaging department figured out how to deliver electronics to himself: Since he was employed with the packaging department, he had easy access...Bruce Schneier From Schneier on Security | July 24, 2015 at 01:49 PM
This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast...Bruce Schneier From Schneier on Security | July 23, 2015 at 07:17 AM
The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to...Bruce Schneier From Schneier on Security | July 23, 2015 at 02:33 AM
In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very...Bruce Schneier From Schneier on Security | July 22, 2015 at 08:26 PM
Google secures photos using public but unguessable URLs: So why is that public URL more secure than it looks? The short answer is that the URL is working as a password...Bruce Schneier From Schneier on Security | July 20, 2015 at 06:25 AM
I may have posted this short video before, but if I did, I can't find it. It's four years old, but still pretty to watch. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | July 17, 2015 at 05:09 PM
Micah Lee has a good tutorial on installing and using secure chat. To recap: We have installed Orbot and connected to the Tor network on Android, and we have installed...Bruce Schneier From Schneier on Security | July 17, 2015 at 07:35 AM
The ProxyHam project (and associated Def Con talk) has been canceled under mysterious circumstances. No one seems to know anything, and conspiracy theories abound...Bruce Schneier From Schneier on Security | July 16, 2015 at 12:00 PM
If you subscribe to my monthly e-mail newsletter, Crypto-Gram, you need to read this. Sometime between now and the August issue, the Crypto-Gram mailing list will...Bruce Schneier From Schneier on Security | July 15, 2015 at 03:15 AM
This is interesting: We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious activists...Bruce Schneier From Schneier on Security | July 14, 2015 at 06:53 AM
Interesting article on the NSA's use of multi-beam antennas for surveillance. Certainly smart technology; it can eavesdrop on multiple targets per antenna. I'm...Bruce Schneier From Schneier on Security | July 13, 2015 at 04:01 PM
A cute series of knitted plushies. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 10, 2015 at 05:29 PM
India is cracking down on people who use technology to cheat on exams: Candidates have been told to wear light clothes with half-sleeves, and shirts that do not...Bruce Schneier From Schneier on Security | July 10, 2015 at 01:44 PM
Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It's a huge trove...Bruce Schneier From Schneier on Security | July 10, 2015 at 05:35 AM
Monday a group of cryptographers and security experts released a major paper outlining the risks of government-mandated back-doors in encryption products: Keys...Bruce Schneier From Schneier on Security | July 9, 2015 at 07:31 AM
This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics...Bruce Schneier From Schneier on Security | July 8, 2015 at 07:36 AM
Read this: Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team's "crisis procedure," it...Bruce Schneier From Schneier on Security | July 7, 2015 at 06:44 PM
I've been reading through the 48 classified documents about the NSA's XKEYSCORE system released by the Intercept last week. From the article: The NSA's XKEYSCORE...Bruce Schneier From Schneier on Security | July 7, 2015 at 07:38 AM
Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data. Hacking Team is a pretty sleazy company, selling surveillance...Bruce Schneier From Schneier on Security | July 6, 2015 at 01:53 PM