From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is new:
Newly revealed research shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by a previously undisclosed...Bruce Schneier From Schneier on Security | December 1, 2022 at 10:10 AM
Facebook—Meta—was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location.
Meta’s total fine by the Data...Bruce Schneier From Schneier on Security | November 30, 2022 at 07:00 AM
Diplomatic code cracked after 500 years:
In painstaking work backed by computers, Pierrot found “distinct families” of about 120 symbols used by Charles V. “Whole...Bruce Schneier From Schneier on Security | November 29, 2022 at 07:19 AM
Laptop technicians routinely violate the privacy of the people whose computers they repair:
Researchers at University of Guelph in Ontario, Canada, recovered logs...Bruce Schneier From Schneier on Security | November 28, 2022 at 10:44 AM
Nothing beats a dog’s nose for detecting explosives. Unfortunately, there aren’t enough dogs:
Last month, the US Government Accountability Office (GAO) released...Bruce Schneier From Schneier on Security | November 23, 2022 at 11:23 AM
Researchers claim that supposedly anonymous device analytics information can identify users:
On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have...Bruce Schneier From Schneier on Security | November 22, 2022 at 10:28 AM
Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken:
The researchers said their break came when they understood that while Zeppelin...Bruce Schneier From Schneier on Security | November 21, 2022 at 07:08 AM
Researchers have new evidence of how squid brains develop:
Researchers from the FAS Center for Systems Biology describe how they used a new live-imaging technique...Bruce Schneier From Schneier on Security | November 18, 2022 at 05:12 PM
Kirkus reviews A Hacker’s Mind:
A cybersecurity expert examines how the powerful game whatever system is put before them, leaving it to others to cover the cost...Bruce Schneier From Schneier on Security | November 18, 2022 at 01:08 PM
Time-triggered Ethernet (TTE) is used in spacecraft, basically to use the same hardware to process traffic with different timing and criticality. Researchers have...Bruce Schneier From Schneier on Security | November 18, 2022 at 10:04 AM
Twitter is having intermittent problems with its two-factor authentication system:
Not all users are having problems receiving SMS authentication codes, and those...Bruce Schneier From Schneier on Security | November 17, 2022 at 05:53 AM
Computer code developed by a company called Pushwoosh is in about 8,000 Apple and Google smartphone apps. The company pretends to be American when it is actually...Bruce Schneier From Schneier on Security | November 16, 2022 at 06:03 AM
Last month, we were warned not to install Qatar’s World Cup app because it was spyware. This month, it’s Egypt’s COP27 Summit app:
The app is being promoted as...Bruce Schneier From Schneier on Security | November 15, 2022 at 07:16 AM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the 24th International Information Security Conference in Madrid, Spain, on November...Schneier.com Webmaster From Schneier on Security | November 14, 2022 at 12:01 PM
The International Committee of the Red Cross wants some digital equivalent to the iconic red cross, to alert would-be hackers that they are accessing a medical...Bruce Schneier From Schneier on Security | November 14, 2022 at 07:38 AM
Perfect for an evening out.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting...Bruce Schneier From Schneier on Security | November 11, 2022 at 05:18 PM
I have a new book coming out in February. It’s about hacking.
A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about hacking...Bruce Schneier From Schneier on Security | November 11, 2022 at 03:11 PM
Here in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that...Bruce Schneier From Schneier on Security | November 11, 2022 at 07:25 AM
The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy:
Google’s Chrome, Apple’s Safari, nonprofit Firefox...Bruce Schneier From Schneier on Security | November 10, 2022 at 10:18 AM
CISA is now pushing phishing-resistant multifactor authentication.
Roger Grimes has an excellent post reminding everyone that “phishing-resistant” is not “phishing...Bruce Schneier From Schneier on Security | November 9, 2022 at 07:18 AM