From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last week, I evaluated the security of a recent GCHQ backdoor proposal for communications systems. Furthering the debate, Nate Cardozo and Seth Schoen of EFF explain...Bruce Schneier From Schneier on Security | January 25, 2019 at 07:08 AM
They have advantages: Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity...Bruce Schneier From Schneier on Security | January 24, 2019 at 07:38 AM
This is interesting: To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized...Bruce Schneier From Schneier on Security | January 23, 2019 at 07:20 AM
Construction cranes are vulnerable to hacking: In our research and vulnerability discoveries, we found that weaknesses in the controllers can be (easily) taken...Bruce Schneier From Schneier on Security | January 22, 2019 at 06:59 AM
This is clever: Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection -- they monitor the motion-sensor input of an infected...Bruce Schneier From Schneier on Security | January 21, 2019 at 07:47 AM
Two squid lollipops, handmade by Shinri Tezuka. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | January 18, 2019 at 05:41 PM
The so-called Crypto Wars have been going on for 25 years now. Basically, the FBI -- and some of their peer agencies in the U.K., Australia, and elsewhere -- argue...Bruce Schneier From Schneier on Security | January 18, 2019 at 06:54 AM
Companies are willing to pay ever-increasing amounts for good zero-day exploits against hard-to-break computers and applications: On Monday, market-leading exploit...Bruce Schneier From Schneier on Security | January 17, 2019 at 07:33 AM
Impressive police work: In a daring move that placed his life in danger, the I.T. consultant eventually gave the F.B.I. his system's secret encryption keys in 2011...Bruce Schneier From Schneier on Security | January 16, 2019 at 07:53 AM
Former Facebook CISO Alex Stamos argues that increasing political pressure on social media platforms to moderate content will give them a pretext to turn all end...Bruce Schneier From Schneier on Security | January 15, 2019 at 06:55 AM
This is a current list of where and when I am scheduled to speak: I'm speaking at A New Initiative for Poland in Warsaw, January 16-17, 2019. I'm speaking at the...Bruce Schneier From Schneier on Security | January 14, 2019 at 05:21 PM
I recently read two different essays that make the point that while Internet security is terrible, it really doesn't affect people enough to make it an issue. This...Bruce Schneier From Schneier on Security | January 14, 2019 at 12:13 PM
This is a fantastic video of a young giant squid named Heck swimming around Toyama Bay near Tokyo. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | January 11, 2019 at 03:48 PM
Nice work: One attraction of a vein based system over, say, a more traditional fingerprint system is that it may be typically harder for an attacker to learn how...Bruce Schneier From Schneier on Security | January 11, 2019 at 07:38 AM
Good essay on the inherent vulnerabilities in the cell phone standards and the market barriers to fixing them. So far, industry and policymakers have largely dragged...Bruce Schneier From Schneier on Security | January 10, 2019 at 06:52 AM
The EU is offering "bug bounties on Free Software projects that the EU institutions rely on." Slashdot thread....Bruce Schneier From Schneier on Security | January 9, 2019 at 08:05 AM
No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how, or when. While the literature generally...Bruce Schneier From Schneier on Security | January 8, 2019 at 07:13 AM
This is clever: How the attack works: Attacker added tens of malicious servers to the Electrum wallet network. Users of legitimate Electrum wallets initiate a Bitcoin...Bruce Schneier From Schneier on Security | January 7, 2019 at 07:13 AM
It's growing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...Bruce Schneier From Schneier on Security | January 4, 2019 at 05:16 PM