From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would...Bruce Schneier From Schneier on Security | March 18, 2015 at 07:09 AM
Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber"...Bruce Schneier From Schneier on Security | March 18, 2015 at 05:22 AM
The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...Bruce Schneier From Schneier on Security | March 18, 2015 at 03:50 AM
I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies...Bruce Schneier From Schneier on Security | March 18, 2015 at 12:13 AM
The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...Bruce Schneier From Schneier on Security | March 12, 2015 at 03:59 PM
Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...Bruce Schneier From Schneier on Security | March 12, 2015 at 07:22 AM
More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...Bruce Schneier From Schneier on Security | March 11, 2015 at 03:41 PM
The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...Bruce Schneier From Schneier on Security | March 11, 2015 at 07:53 AM
The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...Bruce Schneier From Schneier on Security | March 10, 2015 at 03:59 PM
New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...Bruce Schneier From Schneier on Security | March 10, 2015 at 07:50 AM
Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...Bruce Schneier From Schneier on Security | March 9, 2015 at 02:46 PM
The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...Bruce Schneier From Schneier on Security | March 9, 2015 at 08:57 AM
There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...Bruce Schneier From Schneier on Security | March 6, 2015 at 05:21 PM
Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...Bruce Schneier From Schneier on Security | March 6, 2015 at 03:52 PM
This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...Bruce Schneier From Schneier on Security | March 6, 2015 at 11:57 AM
New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...Bruce Schneier From Schneier on Security | March 6, 2015 at 07:28 AM
The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...Bruce Schneier From Schneier on Security | March 5, 2015 at 08:00 AM
One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...Bruce Schneier From Schneier on Security | March 4, 2015 at 08:00 AM
On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...Bruce Schneier From Schneier on Security | March 3, 2015 at 02:59 PM
Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...Bruce Schneier From Schneier on Security | March 3, 2015 at 02:12 PM