From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On Thursday, September 6, starting at 10:00 am CDT, I'll be doing a Reddit "Ask Me Anything" in association with the Ford Foundation. It's about my new book, but...Bruce Schneier From Schneier on Security | August 31, 2018 at 03:06 PM
This is a current list of where and when I am scheduled to speak: I'm giving a book talk on Click Here to Kill Everybody at the Ford Foundation in New York City...Bruce Schneier From Schneier on Security | August 31, 2018 at 02:37 PM
Yet another way of eavesdropping on someone's computer activity: using the webcam microphone to "listen" to the computer's screen....Bruce Schneier From Schneier on Security | August 31, 2018 at 07:29 AM
I've previously written about people cheating in marathon racing by driving -- or otherwise getting near the end of the race by faster means than running. In China...Bruce Schneier From Schneier on Security | August 30, 2018 at 07:34 AM
Interesting story of a CIA intelligence network in China that was exposed partly because of a computer-security failure: Although they used some of the same coding...Bruce Schneier From Schneier on Security | August 29, 2018 at 09:10 AM
Andy Greenberg wrote a fascinating account of the Russian NotPetya worm, with an emphasis on its effects on the company Maersk. BoingBoing post....Bruce Schneier From Schneier on Security | August 28, 2018 at 07:49 AM
A report for the Center for Strategic and International Studies looks at surprise and war. One of the report's cyberwar scenarios is particularly compelling. It...Bruce Schneier From Schneier on Security | August 27, 2018 at 07:16 AM
This seems to have happened twice in two weeks. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | August 24, 2018 at 04:37 PM
Another excellent paper by the Mueller/Stewart team: "Terrorism and Bathtubs: Comparing and Assessing the Risks": Abstract: The likelihood that anyone outside a...Bruce Schneier From Schneier on Security | August 23, 2018 at 06:54 AM
Stuart Schechter published a good primer on the security issues surrounding two-factor authentication. While it's often an important security measure, it's not...Bruce Schneier From Schneier on Security | August 22, 2018 at 06:51 AM
Modern cars have alarm systems that automatically connect to a remote call center. This makes cars harder to steal, since tripping the alarm causes a quick response...Bruce Schneier From Schneier on Security | August 21, 2018 at 06:58 AM
James Mickens gave an excellent keynote at the USENIX Security Conference last week, talking about the social aspects of security -- racism, sexism, etc. -- and...Bruce Schneier From Schneier on Security | August 20, 2018 at 09:07 AM
The Hotaruika Museum is a museum devoted to firefly squid in Toyama, Japan. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | August 17, 2018 at 07:06 PM
Interesting research on web tracking: "Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies: Abstract: Nowadays, cookies are...Bruce Schneier From Schneier on Security | August 17, 2018 at 06:26 AM
Another speculative-execution attack against Intel's SGX. At a high level, SGX is a new feature in modern Intel CPUs which allows computers to protect users' data...Bruce Schneier From Schneier on Security | August 16, 2018 at 12:43 PM
Suprising no one, the security of police bodycams is terrible. Mitchell even realized that because he can remotely access device storage on models like the Fire...Bruce Schneier From Schneier on Security | August 15, 2018 at 07:04 AM
Google is tracking you, even if you turn off tracking: Google says that will prevent the company from remembering where you've been. Google's support page on the...Bruce Schneier From Schneier on Security | August 14, 2018 at 07:22 AM
Fascinating research de-anonymizing code -- from either source code or compiled code: Rachel Greenstadt, an associate professor of computer science at Drexel University...Bruce Schneier From Schneier on Security | August 13, 2018 at 05:02 PM
Interesting video of a robot grabber that's delicate enough to capture squid (and even jellyfish) in the ocean. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | August 10, 2018 at 05:16 PM