From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The thing about infrastructure is that everyone uses it. If it's secure, it's secure for everyone. And if it's insecure, it's insecure for everyone. This forces...Bruce Schneier From Schneier on Security | March 2, 2015 at 07:59 AM
Scientists are attaching cameras to Humboldt squid to watch them communicate with each other. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | February 27, 2015 at 06:00 PM
Over the next two weeks, I am speaking about my new book -- Data and Goliath, if you've missed it -- in New York, Boston, Washington, DC, Seattle, San Francisco...Bruce Schneier From Schneier on Security | February 27, 2015 at 03:55 PM
In December, Google's Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about...Bruce Schneier From Schneier on Security | February 26, 2015 at 07:47 AM
Glenn Greenwald, Laura Poitras, and Edward Snowden did an "Ask Me Anything" on Reddit. Point out anything interesting in the comments. And note that Snowden mentioned...Bruce Schneier From Schneier on Security | February 25, 2015 at 02:54 PM
New paper: "Surreptitiously Weakening Cryptographic Systems," by Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart. Abstract: Revelations...Bruce Schneier From Schneier on Security | February 25, 2015 at 07:09 AM
AT&T is charging a premium for gigabit Internet service without surveillance: The tracking and ad targeting associated with the gigabit service cannot be avoided...Bruce Schneier From Schneier on Security | February 24, 2015 at 07:33 AM
New research on tracking the location of smart phone users by monitoring power consumption: PowerSpy takes advantage of the fact that a phone's cellular transmissions...Bruce Schneier From Schneier on Security | February 23, 2015 at 11:48 AM
This is freaky: A new study showcases the first example of an animal editing its own genetic makeup on-the-fly to modify most of its proteins, enabling adjustments...Bruce Schneier From Schneier on Security | February 20, 2015 at 05:55 PM
It's not just national intelligence agencies that break your https security through man-in-the-middle attacks. Corporations do it, too. For the past few months,...Bruce Schneier From Schneier on Security | February 20, 2015 at 04:53 PM
The Intercept has an extraordinary story: the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of...Bruce Schneier From Schneier on Security | February 20, 2015 at 08:52 AM
Earlier this month, Mark Burnett released a database of ten million usernames and passwords. He collected this data from already-public dumps from hackers who had...Bruce Schneier From Schneier on Security | February 19, 2015 at 02:35 PM
Interesting article on the submarine arms race between remaining hidden and detection. It seems that it is much more expensive for a submarine to hide than it is...Bruce Schneier From Schneier on Security | February 19, 2015 at 07:15 AM
I'm not sure what to make of this, or even what it means. The IRS has a standard called IDES: International Data Exchange Service: "The International Data Exchange...Bruce Schneier From Schneier on Security | February 18, 2015 at 07:42 AM
This week, Kaspersky Labs published detailed information on what it calls the Equation Group -- almost certainly the NSA -- and its abilities to embed spyware deep...Bruce Schneier From Schneier on Security | February 17, 2015 at 01:58 PM
Today my company, Co3 Systems, is changing its name to Resilient Systems. The new name better reflects who we are and what we do. Plus, the old name was kind of...Bruce Schneier From Schneier on Security | February 17, 2015 at 08:00 AM
This is what happens when a PR person gets hold of information he really doesn't understand. "Mustang" is the 16th most common password on the Internet according...Bruce Schneier From Schneier on Security | February 16, 2015 at 09:56 AM
After a year of talking about it, my new book is finally published. This is the copy from the inside front flap: You are under surveillance right now. Your cell...Bruce Schneier From Schneier on Security | February 15, 2015 at 07:41 AM
Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 13, 2015 at 05:58 PM