From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This attack has been feasible for over two decades:
Researchers have devised an attack against nearly all virtual private network applications that forces them...Bruce Schneier From Schneier on Security | May 7, 2024 at 11:32 AM
Lots of complicated details here: too many for me to summarize well. It involves an obscure Section 230 provision—and an even more obscure typo. Read this.Bruce Schneier From Schneier on Security | May 6, 2024 at 07:03 AM
Squid-shaped purses for sale.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting...Bruce Schneier From Schneier on Security | May 3, 2024 at 05:05 PM
I have spoken at several TED conferences over the years.
TEDxPSU 2010: “Reconceptualizing Security”
TEDxCambridge 2013: “The Battle for Power on the Internet”...Bruce Schneier From Schneier on Security | May 3, 2024 at 02:13 PM
The Polish Embassy has posted a series of short interview segments with Marian Rejewski, the first person to crack the Enigma.
Details from his biography.Bruce Schneier From Schneier on Security | May 3, 2024 at 07:10 AM
The UK is the first country to ban default passwords on IoT devices.
On Monday, the United Kingdom became the first country in the world to ban default guessable...Bruce Schneier From Schneier on Security | May 2, 2024 at 07:05 AM
Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her.Bruce Schneier From Schneier on Security | May 1, 2024 at 07:09 AM
Meta has threatened to pull WhatsApp out of India if the courts try to force it to break its end-to-end encryption.Bruce Schneier From Schneier on Security | April 30, 2024 at 07:00 AM
During the Cold War, the US Navy tried to make a secret code out of whale song.
The basic plan was to develop coded messages from recordings of whales, dolphins...Bruce Schneier From Schneier on Security | April 29, 2024 at 07:07 AM
A cruise ship is searching for the colossal squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...Bruce Schneier From Schneier on Security | April 26, 2024 at 05:07 PM
The web has become so interwoven with everyday life that it is easy to forget what an extraordinary accomplishment and treasure it is. In just a few decades, much...Bruce Schneier From Schneier on Security | April 25, 2024 at 07:02 AM
Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been pondering privacy consent for more than a decade, and...Bruce Schneier From Schneier on Security | April 24, 2024 at 07:05 AM
Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their security—in particular, Microsoft...Bruce Schneier From Schneier on Security | April 23, 2024 at 07:09 AM
Interesting social-engineering attack vector:
McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft...Bruce Schneier From Schneier on Security | April 22, 2024 at 11:26 AM
A new bioadhesive makes it easier to attach trackers to squid.
Note: the article does not discuss squid privacy rights.
As usual, you can also use this squid post...Bruce Schneier From Schneier on Security | April 19, 2024 at 05:05 PM
After the XZ Utils discovery, people have been examining other open-source projects. Surprising no one, the incident is not unique:
The OpenJS Foundation Cross...Bruce Schneier From Schneier on Security | April 18, 2024 at 07:06 AM
Canadian legislators proposed 19,600 amendments—almost certainly AI-generated—to a bill in an attempt to delay its adoption.
I wrote about many different legislative...Bruce Schneier From Schneier on Security | April 17, 2024 at 07:08 AM
Brian Krebs reported that X (formerly known as Twitter) started automatically changing twitter.com links to x.com links. The problem is: (1) it changed any domain...Bruce Schneier From Schneier on Security | April 16, 2024 at 07:00 AM
A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms...Bruce Schneier From Schneier on Security | April 15, 2024 at 07:04 AM
This is a current list of where and when I am scheduled to speak:
I’m speaking twice at RSA Conference 2024 in San Francisco. I’ll be on a panel on software liability...Bruce Schneier From Schneier on Security | April 14, 2024 at 12:02 PM