From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index...Bruce Schneier From Schneier on Security | August 30, 2021 at 04:40 PM
Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.Bruce Schneier From Schneier on Security | August 27, 2021 at 11:33 AM
Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security.
I’ve lost count of how many times T-Mobile has been hacked.Bruce Schneier From Schneier on Security | August 27, 2021 at 09:37 AM
Interesting article on squid communication.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read...Bruce Schneier From Schneier on Security | August 26, 2021 at 01:57 PM
It’s pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | August 26, 2021 at 01:55 PM
If you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software — which automatically...Bruce Schneier From Schneier on Security | August 25, 2021 at 11:52 PM
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be...Bruce Schneier From Schneier on Security | August 25, 2021 at 11:13 AM
Interesting National Geographic article.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Readhere...Bruce Schneier From Schneier on Security | August 20, 2021 at 02:19 PM
In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here.
Apple says that hash collisions in its CSAM...Bruce Schneier From Schneier on Security | August 20, 2021 at 09:54 AM
It’s a big one:
As first reported by Motherboard on Sunday, someone on the dark web claims to have obtained the data of 100 million from T-Mobile’s servers andalso...Bruce Schneier From Schneier on Security | August 19, 2021 at 12:00 AM
Apple’s NeuralHash algorithm — the one it’s using for client-side scanning on the iPhone — has been reverse-engineered.
Turns out it was already in iOS 14.3, and...Bruce Schneier From Schneier on Security | August 18, 2021 at 12:51 PM
I’m starting to see writings about a Chinese espionage tool that exploits website vulnerabilities to try and identify Chinese dissidents.Bruce Schneier From Schneier on Security | August 17, 2021 at 04:55 PM
Improved ocean conditions are leading to optimism about this year’s squid catch.
As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | August 13, 2021 at 05:28 PM
The problem with spear phishing it that it takes time and creativity to create individualized enticing phishing emails. Researchers are using GPT-3 to attempt to...Bruce Schneier From Schneier on Security | August 12, 2021 at 04:18 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking (via Internet) at SHIFT Business Festival in Finland, August 25-26, 2021.
I’ll be...Schneier.com Webmaster From Schneier on Security | August 11, 2021 at 10:20 PM
Cobolt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to...Bruce Schneier From Schneier on Security | August 9, 2021 at 03:44 PM
Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. I have been following the details, and discussing it in several...Bruce Schneier From Schneier on Security | August 9, 2021 at 03:41 PM
This is a really interesting story explaining how to defeat Microsoft’s TPM in 30 minutes — without having to solder anything to the motherboard.
Researchers at...Bruce Schneier From Schneier on Security | August 6, 2021 at 04:22 PM
It’s sold out, but the pictures are cute.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read...Bruce Schneier From Schneier on Security | August 6, 2021 at 04:19 PM