From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Wow.
It seems they all exploded simultaneously, which means they were triggered.
Were they each tampered with physically, or did someone figure out how to trigger...Bruce Schneier From Schneier on Security | September 17, 2024 at 11:54 AM
Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article...Bruce Schneier From Schneier on Security | September 17, 2024 at 07:02 AM
CISA wants everyone—and government agencies in particular—to remove or upgrade an Ivanti Cloud Service Appliance (CSA) that is no longer being supported.
Welcome...Bruce Schneier From Schneier on Security | September 16, 2024 at 10:49 AM
This is a current list of where and when I am scheduled to speak:
I’m speaking at eCrime 2024 in Boston, Massachusetts, USA. The event runs from September 24 through...Bruce Schneier From Schneier on Security | September 14, 2024 at 12:01 PM
This is an odd story of serving squid during legislative negotiations in the Philippines.Bruce Schneier From Schneier on Security | September 13, 2024 at 05:00 PM
Over the summer, I gave a talk about AI and democracy at TedXBillings. The recording is <a href="https://www.youtube.com/watch?v=uqC4nb7fLpY”>live.
Please share...Bruce Schneier From Schneier on Security | September 13, 2024 at 02:02 PM
Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article:
The first...Bruce Schneier From Schneier on Security | September 12, 2024 at 11:42 AM
New research evaluating the effectiveness of reward modeling during Reinforcement Learning from Human Feedback (RLHF): “SEAL: Systematic Error Analysis for Value...Bruce Schneier From Schneier on Security | September 11, 2024 at 07:03 AM
According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency.Bruce Schneier From Schneier on Security | September 10, 2024 at 07:04 AM
In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption...Bruce Schneier From Schneier on Security | September 9, 2024 at 07:03 AM
The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile.
Blog moderation policy.Bruce Schneier From Schneier on Security | September 6, 2024 at 05:09 PM
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and...Bruce Schneier From Schneier on Security | September 6, 2024 at 11:16 AM
Really interesting analysis of the American M-209 encryption device and its security.Bruce Schneier From Schneier on Security | September 5, 2024 at 07:05 AM
This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about the severity of the breach. A security researcher...Bruce Schneier From Schneier on Security | September 4, 2024 at 07:03 AM
The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos.
There are a bunch explaining the operations...Bruce Schneier From Schneier on Security | September 3, 2024 at 12:03 PM
Interesting vulnerability:
…a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots and flight attendants toVarious...Bruce Schneier From Schneier on Security | September 2, 2024 at 07:07 AM
Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.Bruce Schneier From Schneier on Security | August 27, 2024 at 07:08 AM
This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary...Bruce Schneier From Schneier on Security | August 26, 2024 at 07:05 AM
Making self-healing materials based on the teeth in squid suckers.
Blog moderation policy.Bruce Schneier From Schneier on Security | August 23, 2024 at 05:03 PM