From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The FBI has shut down a botnet run by Chinese hackers:
The botnet malware infected a number of different types of internet-connected devices around the world,...Bruce Schneier From Schneier on Security | September 19, 2024 at 11:40 AM
Wow.
It seems they all exploded simultaneously, which means they were triggered.
Were they each tampered with physically, or did someone figure out how to trigger...Bruce Schneier From Schneier on Security | September 17, 2024 at 11:54 AM
Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article...Bruce Schneier From Schneier on Security | September 17, 2024 at 07:02 AM
CISA wants everyone—and government agencies in particular—to remove or upgrade an Ivanti Cloud Service Appliance (CSA) that is no longer being supported.
Welcome...Bruce Schneier From Schneier on Security | September 16, 2024 at 10:49 AM
This is a current list of where and when I am scheduled to speak:
I’m speaking at eCrime 2024 in Boston, Massachusetts, USA. The event runs from September 24 through...Bruce Schneier From Schneier on Security | September 14, 2024 at 12:01 PM
This is an odd story of serving squid during legislative negotiations in the Philippines.Bruce Schneier From Schneier on Security | September 13, 2024 at 05:00 PM
Over the summer, I gave a talk about AI and democracy at TedXBillings. The recording is <a href="https://www.youtube.com/watch?v=uqC4nb7fLpY”>live.
Please share...Bruce Schneier From Schneier on Security | September 13, 2024 at 02:02 PM
Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article:
The first...Bruce Schneier From Schneier on Security | September 12, 2024 at 11:42 AM
New research evaluating the effectiveness of reward modeling during Reinforcement Learning from Human Feedback (RLHF): “SEAL: Systematic Error Analysis for Value...Bruce Schneier From Schneier on Security | September 11, 2024 at 07:03 AM
According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency.Bruce Schneier From Schneier on Security | September 10, 2024 at 07:04 AM
In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption...Bruce Schneier From Schneier on Security | September 9, 2024 at 07:03 AM
The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile.
Blog moderation policy.Bruce Schneier From Schneier on Security | September 6, 2024 at 05:09 PM
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and...Bruce Schneier From Schneier on Security | September 6, 2024 at 11:16 AM
Really interesting analysis of the American M-209 encryption device and its security.Bruce Schneier From Schneier on Security | September 5, 2024 at 07:05 AM
This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about the severity of the breach. A security researcher...Bruce Schneier From Schneier on Security | September 4, 2024 at 07:03 AM
The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos.
There are a bunch explaining the operations...Bruce Schneier From Schneier on Security | September 3, 2024 at 12:03 PM
Interesting vulnerability:
…a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots and flight attendants toVarious...Bruce Schneier From Schneier on Security | September 2, 2024 at 07:07 AM
Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.Bruce Schneier From Schneier on Security | August 27, 2024 at 07:08 AM
This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary...Bruce Schneier From Schneier on Security | August 26, 2024 at 07:05 AM