From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good video about the evolutionary history of squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...Bruce Schneier From Schneier on Security | July 12, 2021 at 12:59 PM
Motherboard got its hands on one of those Anom phones that were really FBI honeypots.
The details are interesting.Bruce Schneier From Schneier on Security | July 12, 2021 at 12:58 PM
ArsTechnica has a good story on the REvil ransomware attack of last weekend, with technical details:
This weekend’s attack was carried out with almost surgical...Bruce Schneier From Schneier on Security | July 8, 2021 at 11:12 AM
A vulnerability (just patched) in the random number generator used in the Kaspersky Password Manager resulted in easily guessable passwords:
The password generator...Bruce Schneier From Schneier on Security | July 6, 2021 at 10:27 AM
Detailed story of Volodymyr Kvashuk, a Microsoft insider who noticed a bug in the company’s internal systems that allowed him to create unlimited Xbox gift cards...Bruce Schneier From Schneier on Security | July 4, 2021 at 05:14 PM
Two reports this week. The first is from Microsoft, which wrote:
As part of our investigation into this ongoing activity, we also detected information-stealingwrote...Bruce Schneier From Schneier on Security | July 1, 2021 at 06:29 PM
As ransomware becomes more common, I’m seeing more discussions about the ethics of paying the ransom. Here’s one more contribution to that issue: a research paper...Bruce Schneier From Schneier on Security | July 1, 2021 at 12:01 PM
Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example)...Bruce Schneier From Schneier on Security | June 29, 2021 at 10:12 AM
Pretty wooden model.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines...Bruce Schneier From Schneier on Security | June 27, 2021 at 05:54 PM
From the New York Times: “When an Eel Climbs a Ramp to Eat Squid From a Clamp, That’s a Moray.” The article is about the eel; the squid is just eel food. But still...Bruce Schneier From Schneier on Security | June 27, 2021 at 05:54 PM
It’s a series of vulnerabilities:
Josep Rodriguez, a researcher and consultant at security firm IOActive, has spent the last year digging up and reporting vulnerabilities...Bruce Schneier From Schneier on Security | June 25, 2021 at 09:55 AM
News from Georgetown’s Center for Security and Emerging Technology:
China Claims Its AI Can Beat Human Pilots in Battle: Chinese state media reported that an AI...Bruce Schneier From Schneier on Security | June 25, 2021 at 09:53 AM
The Norwegian Consumer Council just published a fantastic new report: “Time to Ban Surveillance-Based Advertising.” From the Introduction:
The challenges caused...Bruce Schneier From Schneier on Security | June 24, 2021 at 10:44 AM
Wired is reporting on a company called Mollitiam Industries:
Marketing materials left exposed online by a third-party claim Mollitiam’s interception products, dubbed...Bruce Schneier From Schneier on Security | June 22, 2021 at 04:04 PM
At this year’s Apple Worldwide Developer Conference, Apple announced something called “iCloud Private Relay.” That’s basically its private version of onion routing...Bruce Schneier From Schneier on Security | June 21, 2021 at 11:59 AM
It’s called “Squid Fishering.”
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting...Bruce Schneier From Schneier on Security | June 21, 2021 at 11:53 AM
The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line:
The report offers...Bruce Schneier From Schneier on Security | June 20, 2021 at 07:33 PM
Researchers have discovered a vulnerability in Peloton stationary bicycles, one that would give the attacker complete control over the device.
The attack requires...Bruce Schneier From Schneier on Security | June 17, 2021 at 07:20 PM
General Packet Radio Service (GPRS) is a mobile data standard that was widely used in the early 2000s. The first encryption algorithm for that standard was GEA-1...Bruce Schneier From Schneier on Security | June 17, 2021 at 02:51 PM
Paul van Oorschot’s webpage contains a complete copy of his book: Computer Security and the Internet: Tools and Jewels. It’s worth reading.Bruce Schneier From Schneier on Security | June 16, 2021 at 06:27 PM