From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were...Bruce Schneier From Schneier on Security | July 25, 2024 at 02:37 PM
I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership...Bruce Schneier From Schneier on Security | July 25, 2024 at 07:05 AM
Supposedly the DHS has these:
The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company...Bruce Schneier From Schneier on Security | July 24, 2024 at 11:25 AM
This is a fantastic video. It’s an Iranian spider-tailed horned viper (Pseudocerastes urarachnoides). Its tail looks like a spider, which the snake uses to fool...Bruce Schneier From Schneier on Security | July 22, 2024 at 07:06 AM
Peru is trying to protect its territorial waters from Chinese squid-fishing boats.
Blog moderation policy.Bruce Schneier From Schneier on Security | July 19, 2024 at 05:03 PM
Brett Solomon is retiring from AccessNow after fifteen years as its Executive Director. He’s written a blog post about what he’s learned and what comes next.Bruce Schneier From Schneier on Security | July 19, 2024 at 12:02 PM
This is pretty horrific:
…a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement...Bruce Schneier From Schneier on Security | July 18, 2024 at 11:33 AM
6.8%, to be precise.
From ZDNet:
However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all...Bruce Schneier From Schneier on Security | July 17, 2024 at 12:03 PM
Some scholars are inflating their reference counts by sneaking them into metadata:
Citations of scientific work abide by a standardized referencing system: Each...Bruce Schneier From Schneier on Security | July 15, 2024 at 01:13 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking on “Reimagining Democracy in the Age of AI” at the Bozeman Library in Bozeman, Montana...Bruce Schneier From Schneier on Security | July 14, 2024 at 12:05 PM
I didn’t know:
In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps...Bruce Schneier From Schneier on Security | July 12, 2024 at 05:01 PM
The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far)...Bruce Schneier From Schneier on Security | July 12, 2024 at 07:04 AM
Not a lot of details:
Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks...Bruce Schneier From Schneier on Security | July 11, 2024 at 11:09 AM
New attack against the RADIUS authentication protocol:
The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge...Bruce Schneier From Schneier on Security | July 10, 2024 at 10:42 AM
A new vampire squid species was discovered in the South China Sea.
Blog moderation policy.Bruce Schneier From Schneier on Security | July 5, 2024 at 05:39 PM
It’s a serious one:
The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE)...Bruce Schneier From Schneier on Security | July 3, 2024 at 11:27 AM
This article about an app that lets people remotely view bars to see if they’re crowded or not is filled with commentary—on both sides—about privacy and openness...Bruce Schneier From Schneier on Security | July 2, 2024 at 07:06 AM
If you’ve been reading my blog, you’ve noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce...Bruce Schneier From Schneier on Security | July 1, 2024 at 03:01 PM
A new paper, “Polynomial Time Cryptanalytic Extraction of Neural Network Models,” by Adi Shamir and others, uses ideas from differential cryptanalysis to extract...Bruce Schneier From Schneier on Security | July 1, 2024 at 07:05 AM