From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...Bruce Schneier From Schneier on Security | October 30, 2014 at 07:40 AM
The Food and Drug Administration has released guidelines regarding the security of medical devices. I admit that I have not read it....Bruce Schneier From Schneier on Security | October 29, 2014 at 07:40 AM
Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those...Bruce Schneier From Schneier on Security | October 28, 2014 at 02:53 PM
The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...Bruce Schneier From Schneier on Security | October 28, 2014 at 07:59 AM
There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...Bruce Schneier From Schneier on Security | October 27, 2014 at 05:32 PM
Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...Bruce Schneier From Schneier on Security | October 27, 2014 at 03:50 PM
Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It's basically a redesign of RC4, given current cryptographic...Bruce Schneier From Schneier on Security | October 27, 2014 at 11:55 AM
A pair of Humboldt squids attacked a Greenpeace submarine. There's video. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | October 24, 2014 at 05:37 PM
Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, "Printer watermark obfuscation," Proceeding RIIT '14: Proceedings of the 3rd annual...Bruce Schneier From Schneier on Security | October 24, 2014 at 09:57 AM
Susan Landau has a new paper on the NSA's increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need...Bruce Schneier From Schneier on Security | October 23, 2014 at 09:52 AM
Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There's no paper...Bruce Schneier From Schneier on Security | October 22, 2014 at 03:51 PM
Interesting essay on the sorts of things you can learn from anonymized taxi passenger and fare data....Bruce Schneier From Schneier on Security | October 22, 2014 at 06:54 AM
The Guardian has reported that the app Whisper tracks users, and then published a second article explaining what it knows after Whisper denied the story. Here's...Bruce Schneier From Schneier on Security | October 21, 2014 at 01:07 PM
FBI Director James Comey again called for an end to secure encryption by putting in a backdoor. Here's his speech: There is a misconception that building a lawful...Bruce Schneier From Schneier on Security | October 21, 2014 at 10:58 AM
Last month, I wrote that the FBI identified Ross W. Ulbricht as the Silk Road's Dread Pirate Roberts through a leaky CAPTCHA. Seems that story doesn't hold water...Bruce Schneier From Schneier on Security | October 20, 2014 at 07:19 AM
That's a lot. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And commenting was broken for a...Bruce Schneier From Schneier on Security | October 17, 2014 at 06:17 PM
Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine....Bruce Schneier From Schneier on Security | October 17, 2014 at 07:35 AM
ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography...Bruce Schneier From Schneier on Security | October 16, 2014 at 07:22 AM