From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five...Bruce Schneier From Schneier on Security | December 19, 2019 at 07:31 AM
This isn't a first, but I think it will be the first conviction: The GIF set off a highly unusual court battle that is expected to equip those in similar circumstances...Bruce Schneier From Schneier on Security | December 18, 2019 at 06:34 AM
New details: At the CyberwarCon conference in Arlington, Virginia, on Thursday, Microsoft security researcher Ned Moran plans to present new findings from the company's...Bruce Schneier From Schneier on Security | December 17, 2019 at 07:05 AM
Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many...Bruce Schneier From Schneier on Security | December 16, 2019 at 07:00 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at SecIT by Heise in Hannover, Germany on March 26, 2020. The list is maintained...Bruce Schneier From Schneier on Security | December 14, 2019 at 02:00 PM
Interesting stuff. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | December 13, 2019 at 05:02 PM
EFF has published a comprehensible and very readable "deep dive" into the technologies of corporate surveillance, both on the Internet and off. Well worth reading...Bruce Schneier From Schneier on Security | December 13, 2019 at 07:01 AM
Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly...Bruce Schneier From Schneier on Security | December 12, 2019 at 07:11 AM
Privacy International has published a detailed, technical examination of how data is extracted from smartphones....Bruce Schneier From Schneier on Security | December 11, 2019 at 07:19 AM
There's a serous debate on reforming Section 230 of the Communications Decency Act. I am in the process of figuring out what I believe, and this is more a place...Bruce Schneier From Schneier on Security | December 10, 2019 at 07:16 AM
Interesting taxonomy of machine-learning failures (pdf) that encompasses both mistakes and attacks, or -- in their words -- intentional and unintentional failure...Bruce Schneier From Schneier on Security | December 9, 2019 at 06:56 AM
Watchmen supporting material. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | December 6, 2019 at 05:20 PM
Andy Ellis, the CSO of Akamai, gave a great talk about the psychology of risk at the Business of Software conference this year. I've written about this before....Bruce Schneier From Schneier on Security | December 6, 2019 at 07:55 AM
Interesting story of a flawed computer voting machine and a paper ballot available for recount. All ended well, but only because of that paper backup. Vote totals...Bruce Schneier From Schneier on Security | December 5, 2019 at 07:06 AM
Carolyn McCarthy gave an excellent TEDx talk about becoming a tech policy activist. It's a powerful call for public-interest technologists....Bruce Schneier From Schneier on Security | December 4, 2019 at 07:04 AM
This just in: We are pleased to announce the factorization of RSA-240, from RSA's challenge list, and the computation of a discrete logarithm of the same size (795...Bruce Schneier From Schneier on Security | December 3, 2019 at 03:12 PM
The New Yorker has published the long and interesting story of the cybersecurity firm Tiversa. Watching "60 Minutes," Boback saw a remarkable new business angle...Bruce Schneier From Schneier on Security | December 3, 2019 at 07:19 AM
New South Wales is implementing a camera system that automatically detects when a driver is using a mobile phone....Bruce Schneier From Schneier on Security | December 2, 2019 at 06:56 AM
The Sea Hunting Autonomous Reconnaissance Drone (SHARD) swims like a squid and can explode on command. As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | November 29, 2019 at 05:13 PM
Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented...Bruce Schneier From Schneier on Security | November 29, 2019 at 06:43 AM