From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's an interesting project to detect false rumors on the Internet.
The EU-funded project aims to classify online rumours into four types: speculation -- such...schneier From Schneier on Security | February 21, 2014 at 09:34 AM
Nice profile of Brian Krebs, cybersecurity journalist:
Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks...schneier From Schneier on Security | February 20, 2014 at 05:09 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
CANDYGRAM
(S//SI//REL) Mimics GSM cell tower of a target network. Capable(S...schneier From Schneier on Security | February 20, 2014 at 03:11 PM
Remote-Controlled System (RCS) is a piece of spyware sold exclusively to governments by a Milan company called Hacking Team. Recently, Citizen Lab found this spyware...schneier From Schneier on Security | February 20, 2014 at 10:19 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
TOTEGHOSTLY 2.0
(TS//SI//REL) TOTEGHOSTLY 2.0 is STRAITBIZARRE based implant...schneier From Schneier on Security | February 19, 2014 at 03:18 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
TOTECHASER
(TS//SI//REL) TOTECHASER is a Windows CE implant targeting thehere...schneier From Schneier on Security | February 18, 2014 at 03:17 PM
In a story about a stolen Stradivarius violin, there's this:
Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for...schneier From Schneier on Security | February 18, 2014 at 09:30 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
PICASSO
(S//SI//REL) Modified GSM (target) handset that collects user data...schneier From Schneier on Security | February 17, 2014 at 03:20 PM
I signed an open letter from US researchers in cryptography and information security on NSA surveillance. It has received a lot of media coverage.schneier From Schneier on Security | February 17, 2014 at 01:13 PM
One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...schneier From Schneier on Security | February 17, 2014 at 06:23 AM
Interesting.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 14, 2014 at 05:02 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
MONKEYCALENDAR
(TS//SI//REL) MONKEYCALENDAR is a software implant for GSMhere...schneier From Schneier on Security | February 14, 2014 at 04:19 PM
Earlier this month, I gave a talk about the NSA at MIT. The video is available.
ETA: The video doesn't display on some Firefox browsers. If you have trouble,...schneier From Schneier on Security | February 14, 2014 at 03:50 PM
We now know a lot about the security of the Rapiscan 522 B x-ray system used to scan carry-on baggage in airports worldwide. Billy Rios, director of threat intelligence...schneier From Schneier on Security | February 14, 2014 at 07:50 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
GOPHERSET
(TS//SI//REL) GOPHERSET is a software implant for GSM (Global System...schneier From Schneier on Security | February 13, 2014 at 03:05 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
DROPOUTJEEP
(TS//SI//REL) DROPOUTJEEP is a STRAITBIZARRE based software implant...schneier From Schneier on Security | February 12, 2014 at 03:06 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SURLYSPAWN
(TS//SI//REL TO USA,FVEY) Data RF retro-reflector. Provides return...schneier From Schneier on Security | February 11, 2014 at 03:55 PM
Cory Doctorow gives a good history of the intersection of Digital Rights Management (DRM) software and the law, describes how DRM software is antithetical to end...schneier From Schneier on Security | February 11, 2014 at 08:15 AM
We’ve got a new nation-state espionage malware. "The Mask" was discovered by Kaspersky Labs:
The primary targets are government institutions, diplomatic offices...schneier From Schneier on Security | February 11, 2014 at 07:57 AM