From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good article on using long-range familial searching -- basically, DNA matching of distant relatives -- as a police forensics tool....Bruce Schneier From Schneier on Security | January 2, 2019 at 10:29 AM
Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks...Bruce Schneier From Schneier on Security | December 31, 2018 at 06:57 AM
This is almost over: From 1 December 2018 -- 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will...Bruce Schneier From Schneier on Security | December 28, 2018 at 05:04 PM
Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are: HADQSSFC98WCQ...Bruce Schneier From Schneier on Security | December 28, 2018 at 01:11 PM
This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large...Bruce Schneier From Schneier on Security | December 28, 2018 at 07:43 AM
The New York Times is reporting on the security measures people are using to protect nativity displays....Bruce Schneier From Schneier on Security | December 27, 2018 at 07:25 AM
Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses...Bruce Schneier From Schneier on Security | December 26, 2018 at 07:27 AM
Stealing packages from unattended porches is a rapidly rising crime, as more of us order more things by mail. One person hid a glitter bomb and a video recorder...Bruce Schneier From Schneier on Security | December 25, 2018 at 07:13 AM
Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital...Bruce Schneier From Schneier on Security | December 24, 2018 at 07:25 AM
North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | December 21, 2018 at 05:14 PM
Someone is flying a drone over Gatwick Airport in order to disrupt service: Chris Woodroofe, Gatwick's chief operating officer, said on Thursday afternoon there...Bruce Schneier From Schneier on Security | December 21, 2018 at 07:24 AM
Fascinating article about the many ways Amazon Marketplace sellers sabotage each other and defraud customers. The opening example: framing a seller for false advertising...Bruce Schneier From Schneier on Security | December 20, 2018 at 07:21 AM
The US House of Representatives Committee on Oversight and Government Reform has just released a comprehensive report on the 2017 Equifax hack. It's a great piece...Bruce Schneier From Schneier on Security | December 19, 2018 at 07:00 AM
Peter Swire proposes a a pedagogic framework for teaching cybersecurity policy. Specifically, he makes real the old joke about adding levels to the OSI networking...Bruce Schneier From Schneier on Security | December 18, 2018 at 07:31 AM
A new variant of the Shamoon malware has destroyed signifigant amounts of data at a UAE "heavy engineering company" and the Italian oil and gas contractor Saipem...Bruce Schneier From Schneier on Security | December 17, 2018 at 07:30 AM
Attackers are targeting two-factor authentication systems: Attackers working on behalf of the Iranian government collected detailed information on targets and used...Bruce Schneier From Schneier on Security | December 14, 2018 at 11:02 AM
Piling on from last week's post, the squid emoji's siphon is in the wrong place. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | December 13, 2018 at 05:23 PM
The New York Times and Reuters are reporting that China was behind the recent hack of Mariott Hotels. Note that this is still uncomfirmed, but interesting if it...Bruce Schneier From Schneier on Security | December 13, 2018 at 07:37 AM
Last week, Australia passed a law https://www.bbc.com/news/world-australia-46463029">giving the government the ability to demand backdoors in computers and communications...Bruce Schneier From Schneier on Security | December 12, 2018 at 10:18 AM
The research group AI Now just published its annual report. It's an excellent summary of today's AI security challenges, as well as a policy agenda to address them...Bruce Schneier From Schneier on Security | December 10, 2018 at 10:27 AM