From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long article on the manipulation of GPS in Shanghai. It seems not to be some Chinese military program, but ships who are stealing sand. The Shanghai "crop circles...Bruce Schneier From Schneier on Security | November 21, 2019 at 07:26 AM
Iran has gone pretty much entirely offline in the wake of nationwide protests. This is the best article detailing what's going on; this is also good. AccessNow...Bruce Schneier From Schneier on Security | November 20, 2019 at 07:52 AM
Researchers have discovered and revealed 146 vulnerabilities in various incarnations of Android smartphone firmware. The vulnerabilities were found by scanning...Bruce Schneier From Schneier on Security | November 18, 2019 at 07:33 AM
Neat video, and an impressive-looking squid. I can't figure out how long it is. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | November 15, 2019 at 05:13 PM
Really interesting research: TPM-FAIL: TPM meets Timing and Lattice Attacks, by Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, and Nadia Heninger. Abstract: Trusted...Bruce Schneier From Schneier on Security | November 15, 2019 at 10:36 AM
This is a current list of where and when I am scheduled to speak: I'm speaking on "Securing a World of Physically Capable Computers" at the Indian Institute of...Bruce Schneier From Schneier on Security | November 14, 2019 at 02:17 PM
Technologists and policymakers largely inhabit two separate worlds. It's an old problem, one that the British scientist CP Snow identified in a 1959 essay entitled...Bruce Schneier From Schneier on Security | November 14, 2019 at 08:04 AM
Autonomous systems are going to have to do much better than this. The Uber car that hit and killed Elaine Herzberg in Tempe, Ariz., in March 2018 could not recognize...Bruce Schneier From Schneier on Security | November 13, 2019 at 07:16 AM
The Wall Street Journal has a story about how two people were identified as the perpetrators of a ransomware scheme. They were found because -- as generally happens...Bruce Schneier From Schneier on Security | November 12, 2019 at 07:15 AM
Interesting: Siri, Alexa, and Google Assistant are vulnerable to attacks that use lasers to inject inaudible -- and sometimes invisible -- commands into the devices...Bruce Schneier From Schneier on Security | November 11, 2019 at 07:14 AM
The headline gives the story: "An 80-Foot Steel Kraken Will Create an Artificial Coral Reef Near the British Virgin Islands." As usual, you can also use this squid...Bruce Schneier From Schneier on Security | November 8, 2019 at 05:20 PM
xHelper is not interesting because of its infection mechanism; the user has to side-load an app onto his phone. It's not interesting because of its payload; it...Bruce Schneier From Schneier on Security | November 8, 2019 at 07:10 AM
Fireeye reports on a Chinese-sponsored espionage effort to eavesdrop on text messages: FireEye Mandiant recently discovered a new malware family used by APT41 (a...Bruce Schneier From Schneier on Security | November 7, 2019 at 07:05 AM
This is a fascinating article about a bait-and-switch Airbnb fraud. The article focuses on one particular group of scammers and how they operate, using the fact...Bruce Schneier From Schneier on Security | November 6, 2019 at 07:19 AM
This essay discusses the futility of opting out of surveillance, and suggests data obfuscation as an alternative. We can apply obfuscation in our own lives by using...Bruce Schneier From Schneier on Security | November 5, 2019 at 07:15 AM
Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest...Bruce Schneier From Schneier on Security | November 4, 2019 at 07:06 AM
Research paper: "Triassic Kraken: The Berlin Ichthyosaur Death Assemblage Interpreted as a Giant Cephalopod Midden": Abstract: The Luning Formation at Berlin Ichthyosaur...Bruce Schneier From Schneier on Security | November 1, 2019 at 05:12 PM
Kathryn Waldron at R Street has collected all of the different resources and methodologies for measuring cybersecurity....Bruce Schneier From Schneier on Security | November 1, 2019 at 07:27 AM
Interesting story. I always recommend using a random number generator like Fortuna, even if you're using a hardware random source. It's just safer....Bruce Schneier From Schneier on Security | October 31, 2019 at 07:24 AM
WhatsApp is suing the Israeli cyberweapons arms manufacturer NSO Group in California court: WhatsApp's lawsuit, filed in a California court on Tuesday, has demanded...Bruce Schneier From Schneier on Security | October 30, 2019 at 10:36 AM