From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Fourteen feet long and 450 pounds. It was dead before it washed up. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | June 19, 2020 at 05:15 PM
Today is the second day of the thirteenth Workshop on Security and Human Behavior. It's being hosted by the University of Cambridge, which in today's world means...Bruce Schneier From Schneier on Security | June 19, 2020 at 03:09 PM
Citizen Lab has a new report on Dark Basin, a large hacking-for-hire company in India. Key Findings: Dark Basin is a hack-for-hire group that has targeted thousands...Bruce Schneier From Schneier on Security | June 19, 2020 at 07:38 AM
The Washington Post is reporting on an internal CIA report about its "Vault 7" security breach: The breach -- allegedly committed by a CIA employee -- was discovered...Bruce Schneier From Schneier on Security | June 18, 2020 at 07:34 AM
Zoom is doing the right thing: it's making end-to-end encryption available to all users, paid and unpaid. (This is a change; I wrote about the initial decision...Bruce Schneier From Schneier on Security | June 17, 2020 at 02:55 PM
South Africa's Postbank experienced a catastrophic security failure. The bank's master PIN key was stolen, forcing it to cancel and replace 12 million bank cards...Bruce Schneier From Schneier on Security | June 17, 2020 at 07:21 AM
New research is able to recover sound waves in a room by observing minute changes in the room's light bulbs. This technique works from a distance, even from a building...Bruce Schneier From Schneier on Security | June 16, 2020 at 11:20 AM
Jason Healey takes a detailed look at the US federal cybersecurity budget and reaches an important conclusion: the US keeps saying that we need to prioritize defense...Bruce Schneier From Schneier on Security | June 15, 2020 at 07:06 AM
I think we need more human organs with squid-like features. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | June 12, 2020 at 05:03 PM
This is a weird story: Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of surveillance...Bruce Schneier From Schneier on Security | June 12, 2020 at 07:23 AM
Remember Spectre and Meltdown? Back in early 2018, I wrote: Spectre and Meltdown are pretty catastrophic vulnerabilities, but they only affect the confidentiality...Bruce Schneier From Schneier on Security | June 11, 2020 at 07:40 AM
New research on using specially crafted inputs to slow down machine-learning neural network systems: Sponge Examples: Energy-Latency Attacks on Neural Networks...Bruce Schneier From Schneier on Security | June 10, 2020 at 07:31 AM
New research: "Security Analysis of the Democracy Live Online Voting System": Abstract: Democracy Live's OmniBallot platform is a web-based system for blank ballot...Bruce Schneier From Schneier on Security | June 9, 2020 at 07:26 AM
Google's threat analysts have identified state-level attacks from China. I hope both campaigns are working under the assumption that everything they say and do...Bruce Schneier From Schneier on Security | June 8, 2020 at 07:13 AM
National Geographic has a photo of a 7-foot long shark that fought a giant squid and lived to tell the tale. Or, at least, lived to show off the suction marks on...Bruce Schneier From Schneier on Security | June 5, 2020 at 05:19 PM
I just published a new paper with Karen Levy of Cornell: "Privacy Threats in Intimate Relationships." Abstract: This article provides an overview of intimate threats...Bruce Schneier From Schneier on Security | June 5, 2020 at 07:13 AM
Zoom was doing so well.... And now we have this: Corporate clients will get access to Zoom's end-to-end encryption service now being developed, but Yuan said free...Bruce Schneier From Schneier on Security | June 4, 2020 at 07:24 AM
This is interesting: The image, a seemingly innocuous sunset (or dawn) sky above placid waters, may be viewed without harm. But if loaded as wallpaper, the phone...Bruce Schneier From Schneier on Security | June 3, 2020 at 07:11 AM
Researcher Bhavuk Jain discovered a vulnerability in the "Sign in with Apple" feature, and received a $100,000 bug bounty from Apple. Basically, forged tokens could...Bruce Schneier From Schneier on Security | June 2, 2020 at 07:27 AM