From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last week, CNN reported that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes -- 60...Bruce Schneier From Schneier on Security | August 10, 2018 at 07:10 AM
Really interesting article: A trained eye (or even a not-so-trained one) can discern when something phishy is going on with a domain or subdomain name. There are...Bruce Schneier From Schneier on Security | August 9, 2018 at 07:17 AM
BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace...Bruce Schneier From Schneier on Security | August 8, 2018 at 10:37 AM
Interesting research: "Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions": Abstract: Accurately modeling human decision-making in security...Bruce Schneier From Schneier on Security | August 7, 2018 at 07:40 AM
Long and interesting story -- now two decades old -- of massive fraud perpetrated against the McDonald's Monopoly sweepstakes. The central fraudster was the person...Bruce Schneier From Schneier on Security | August 6, 2018 at 06:57 AM
The calamari squid grabs prey three feet away with its fast tentacles. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | August 3, 2018 at 05:15 PM
Humble Bundle sells groups of e-books at ridiculously low prices, DRM free. This month, the bundles are all Wiley titles, including three of my books: Applied Cryptography...Bruce Schneier From Schneier on Security | August 3, 2018 at 03:10 PM
Interesting commentary: The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack...Bruce Schneier From Schneier on Security | August 3, 2018 at 07:21 AM
Evidence that stolen credit cards are being used to purchase items in games like Clash of Clans, which are then resold for cash....Bruce Schneier From Schneier on Security | August 2, 2018 at 07:14 AM
The UK's GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. Ubiquitous...Bruce Schneier From Schneier on Security | August 1, 2018 at 03:07 PM
We don't know if this is error or deliberate action, but five backdoors have been discovered already this year....Bruce Schneier From Schneier on Security | August 1, 2018 at 07:22 AM
The Diqee 360 robotic vacuum cleaner can be turned into a surveillance device. The attack requires physical access to the device, so in the scheme of things it's...Bruce Schneier From Schneier on Security | July 31, 2018 at 07:40 AM
Good policy paper (summary here) on the threats, current state, and potential policy solutions for the poor security of US space systems....Bruce Schneier From Schneier on Security | July 30, 2018 at 01:08 PM
Interesting research: "You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information," by Beatrice Perez, Mirco Musolesi...Bruce Schneier From Schneier on Security | July 30, 2018 at 07:35 AM
This is a fantastic video of a squid attracting prey with a tentacle that looks like a smaller squid. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | July 27, 2018 at 05:12 PM
According to a new CSIS report, "going dark" is not the most pressing problem facing law enforcement in the age of digital data: Over the past year, we conducted...Bruce Schneier From Schneier on Security | July 27, 2018 at 01:10 PM
Krebs on Security is reporting that all 85,000 Google employees use two-factor authentication with a physical token. A Google spokesperson said Security Keys now...Bruce Schneier From Schneier on Security | July 26, 2018 at 01:18 PM
Bluetooth has a serious security vulnerability: In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation...Bruce Schneier From Schneier on Security | July 25, 2018 at 03:08 PM