From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting article talks about the 2008 cyberattack against a Turkish oil pipeline: For western intelligence agencies, the blowout was a watershed event. Hackers...Bruce Schneier From Schneier on Security | December 23, 2014 at 09:38 AM
First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is...Bruce Schneier From Schneier on Security | December 22, 2014 at 07:51 AM
Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | December 19, 2014 at 05:48 PM
Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...Bruce Schneier From Schneier on Security | December 19, 2014 at 01:46 PM
There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into...Bruce Schneier From Schneier on Security | December 19, 2014 at 07:41 AM
Citizen Lab has a new report on a probable ISIS-launched cyberattack: This report describes a malware attack with circumstantial links to the Islamic State in Iraq...Bruce Schneier From Schneier on Security | December 18, 2014 at 11:07 AM
"The next time you call for assistance because the Internet service in your home is not working, the 'technician' who comes to your door may actually be an undercover...Bruce Schneier From Schneier on Security | December 18, 2014 at 07:57 AM
Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....Bruce Schneier From Schneier on Security | December 17, 2014 at 07:44 AM
In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...Bruce Schneier From Schneier on Security | December 16, 2014 at 12:35 PM
There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt...Bruce Schneier From Schneier on Security | December 15, 2014 at 07:57 AM
There is year-round recreational squid fishing from the Strait of Juan de Fuca to south Puget Sound. A nighttime sport that requires simple, inexpensive fishing...Bruce Schneier From Schneier on Security | December 12, 2014 at 05:58 PM
On 12/18 I'll be part of a Co3 webinar where we examine incident-response trends of 2014 and look ahead to 2015. I tend not to do these, but this is an exception...Bruce Schneier From Schneier on Security | December 12, 2014 at 03:05 PM
Remember last winter when President Obama called for an end to the NSA's telephone metadata collection program? He didn't actually call for an end to it; he just...Bruce Schneier From Schneier on Security | December 12, 2014 at 11:00 AM
I don't have a lot to say about the Sony hack, which seems to still be ongoing. I want to highlight a few points, though. At this point, the attacks seem to be...Bruce Schneier From Schneier on Security | December 11, 2014 at 03:45 PM
This article is reporting that the demand for Chief Information Security Officers far exceeds supply: Sony and every other company that realizes the need for a...Bruce Schneier From Schneier on Security | December 11, 2014 at 07:57 AM
Interesting article: "How terrorism fears are transforming America's public space." I am reminded of my essay from four years ago: "Close the Washington Monument...Bruce Schneier From Schneier on Security | December 10, 2014 at 12:52 PM
The Intercept has published an article -- based on the Snowden documents -- about AURORAGOLD, an NSA surveillance operation against cell phone network operators...Bruce Schneier From Schneier on Security | December 9, 2014 at 07:33 AM
Government surplus. Only $8,000 on eBay. Note that this device has been analyzed before....Bruce Schneier From Schneier on Security | December 8, 2014 at 12:52 PM
Last week, we learned about a striking piece of malware called Regin that has been infecting computer networks worldwide since 2008. It's more sophisticated than...Bruce Schneier From Schneier on Security | December 8, 2014 at 08:56 AM