From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is serious:
A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...Bruce Schneier From Schneier on Security | March 20, 2025 at 11:14 AM
Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama:
Abstract: In human...Bruce Schneier From Schneier on Security | March 18, 2025 at 07:10 AM
New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
Abstract: Key lengths...Bruce Schneier From Schneier on Security | March 17, 2025 at 11:09 AM
A bagpipe and drum band:
SQUID transforms traditional Bagpipe and Drum Band entertainment into a multi-sensory rush of excitement, featuring high energy bagpipes...Bruce Schneier From Schneier on Security | March 14, 2025 at 05:03 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking at the Rossfest Symposium in Cambridge, UK, on March 25, 2025.
I’m speaking at the...Bruce Schneier From Schneier on Security | March 14, 2025 at 12:03 PM
There is a new botnet that is infecting TP-Link routers:
The botnet can lead to command injection which then makes remote code execution (RCE) possible so that...Bruce Schneier From Schneier on Security | March 14, 2025 at 07:02 AM
Former CISA Director Jen Easterly writes about a new international intelligence sharing co-op:
Historically, China, Russia, Iran & North Korea have cooperated to...Bruce Schneier From Schneier on Security | March 12, 2025 at 07:09 AM
Lots of interesting details in the story:
The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade...Bruce Schneier From Schneier on Security | March 11, 2025 at 01:14 PM
The malware includes four separate backdoors:
Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed...Bruce Schneier From Schneier on Security | March 10, 2025 at 07:01 AM
The EFF has created an open-source hardware tool to detect IMSI catchers: fake cell phone towers that are used for mass surveillance of an area.
It runs on a $20...Bruce Schneier From Schneier on Security | March 7, 2025 at 12:03 PM
Of the five, one is a Windows vulnerability, another is a Cisco vulnerability. We don’t have any details about who is exploiting them, or how.
News article. Slashdot...Bruce Schneier From Schneier on Security | March 5, 2025 at 07:00 AM
This is a sad story of someone who downloaded a Trojaned AI tool that resulted in hackers taking over his computer and, ultimately, costing him his job.Bruce Schneier From Schneier on Security | March 4, 2025 at 07:08 AM
Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“:
Abstract: We present a surprising result regarding LLMs and...Bruce Schneier From Schneier on Security | February 27, 2025 at 01:05 PM
Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United...Bruce Schneier From Schneier on Security | February 26, 2025 at 07:07 AM
It looks like a very sophisticated attack against the Dubai-based exchange Bybit:
Bybit officials disclosed the theft of more than 400,000 ethereum and staked...Bruce Schneier From Schneier on Security | February 25, 2025 at 12:04 PM
These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating.
Researchers gave the models a seemingly...Bruce Schneier From Schneier on Security | February 24, 2025 at 07:08 AM