From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Here are all the NSA's patents, in one searchable database. If you find something good, tell us all in the comments....Bruce Schneier From Schneier on Security | August 1, 2014 at 07:54 AM
This is pretty impressive: Most of us learned long ago not to run executable files from sketchy USB sticks. But old-fashioned USB hygiene can't stop this newer...Bruce Schneier From Schneier on Security | July 31, 2014 at 03:31 PM
Clever: Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions...Bruce Schneier From Schneier on Security | July 31, 2014 at 07:56 AM
New America Foundation has a new paper on the costs of NSA surveillance: economic costs to US business, costs to US foreign policy, and costs to security. News...Bruce Schneier From Schneier on Security | July 29, 2014 at 01:54 PM
There was a conference on deception earlier this month. Sophie Van Der Zee has a summary of the sessions....Bruce Schneier From Schneier on Security | July 29, 2014 at 07:50 AM
Russia has put out a tender on its official government procurement website for anyone who can identify Tor users. The reward of $114,000 seems pretty cheap for...Bruce Schneier From Schneier on Security | July 28, 2014 at 08:00 AM
An interactive animation from the Museum of New Zealand Te Papa Tongarewa. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | July 25, 2014 at 05:46 PM
Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there's no reason this can't scale to much larger numbers...Bruce Schneier From Schneier on Security | July 25, 2014 at 11:35 AM
A group of hackers are using a vulnerability in the Next thermostat to secure it against Nest's remote data collection....Bruce Schneier From Schneier on Security | July 22, 2014 at 11:46 AM
Here's a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly...Bruce Schneier From Schneier on Security | July 21, 2014 at 04:38 PM
A six-hour video of a giant squid dissection from Auckland University of Technology. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | July 18, 2014 at 05:35 PM
The Maryland Air National Guard needs a new facility for its cyberwar operations: The purpose of this facility is to house a Network Warfare Group and ISR Squadron...Bruce Schneier From Schneier on Security | July 17, 2014 at 04:54 PM
The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a...Bruce Schneier From Schneier on Security | July 17, 2014 at 07:17 AM
Here's some interesting research on foiling traffic analysis of cloud storage systems. Press release....Bruce Schneier From Schneier on Security | July 16, 2014 at 07:02 AM
Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...Bruce Schneier From Schneier on Security | July 15, 2014 at 03:30 PM
Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...Bruce Schneier From Schneier on Security | July 15, 2014 at 07:49 AM
The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...Bruce Schneier From Schneier on Security | July 14, 2014 at 03:01 PM
This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...Bruce Schneier From Schneier on Security | July 14, 2014 at 07:16 AM