From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely...Bruce Schneier From Schneier on Security | August 6, 2020 at 01:15 PM
The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic....Bruce Schneier From Schneier on Security | August 4, 2020 at 07:02 AM
Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first...Bruce Schneier From Schneier on Security | August 3, 2020 at 12:54 PM
A 17-year-old Florida boy was arrested and charged with last week's Twitter hack. News articles. Boing Boing post. Florida state attorney press release. This is...Bruce Schneier From Schneier on Security | July 31, 2020 at 05:03 PM
Researchers are synthesizing squid proteins to create a face mask that better survives cleaning. (And you thought there was no connection between squid and COVID...Bruce Schneier From Schneier on Security | July 31, 2020 at 05:00 PM
Notice the copy of Data and Goliath just behind the head of Maine Senator Angus King. This demonstrates the importance of a vibrant color and a large font....Bruce Schneier From Schneier on Security | July 31, 2020 at 03:04 PM
Fireeye is reporting that a hacking group called Ghostwriter broke into the content management systems of Eastern European news sites to plant fake stories. From...Bruce Schneier From Schneier on Security | July 30, 2020 at 03:56 PM
The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors...Bruce Schneier From Schneier on Security | July 28, 2020 at 07:40 AM
In Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image...Bruce Schneier From Schneier on Security | July 27, 2020 at 10:46 AM
The Kraken is the name of Seattle's new NFL franchise. I have always really liked collective nouns as sports team names (like the Utah Jazz or the Minnesota Wild)...Bruce Schneier From Schneier on Security | July 24, 2020 at 05:07 PM
NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to encryption and data protection...Bruce Schneier From Schneier on Security | July 24, 2020 at 07:36 AM
I just co-authored a paper on the legal risks of doing machine learning research, given the current state of the Computer Fraud and Abuse Act: Abstract: Adversarial...Bruce Schneier From Schneier on Security | July 23, 2020 at 07:03 AM
Fawkes is a system for manipulating digital images so that they aren't recognized by facial recognition systems. At a high level, Fawkes takes your personal images...Bruce Schneier From Schneier on Security | July 22, 2020 at 10:12 AM
This hack targets the firmware on modern power supplies. (Yes, power supplies are also computers.) Normally, when a phone is connected to a power brick with support...Bruce Schneier From Schneier on Security | July 21, 2020 at 07:09 AM
Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the...Bruce Schneier From Schneier on Security | July 20, 2020 at 09:49 AM
Headline: "Dozens of squid found on Provincetown sandbar." Slow news day. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | July 17, 2020 at 05:13 PM
Motherboard is reporting that this week's Twitter hack involved a bribed insider. Twitter has denied it. I have been taking press calls all day about this. And...Bruce Schneier From Schneier on Security | July 17, 2020 at 07:04 AM
The NSA's Central Security Service -- that's the part that's supposed to work on defense -- has released two documents (a full and an abridged version) on securing...Bruce Schneier From Schneier on Security | July 15, 2020 at 10:29 AM
A personal account of someone who was paid to buy products on Amazon and leave fake reviews. Fake reviews are one of the problems that everyone knows about, and...Bruce Schneier From Schneier on Security | July 13, 2020 at 07:21 AM