Source: www.schneier.com – Author: Bruce Schneier Google removed fake Signal and Telegram apps from its Play store. An app with the name Signal Plus Messenger was...
Author:
Zero-Click Exploit in iPhones – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Make sure you update your iPhones: Citizen Lab says two zero-days fixed by Apple today in emergency security updates were...
Cars Have Terrible Data Privacy – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Cars Have Terrible Data Privacy A new Mozilla Foundation report concludes that cars, all of them, have terrible data...
On Robots Killing People – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The robot revolution began long ago, and so did the killing. One day in 1979, a robot at a Ford...
Friday Squid Blogging: Glass Squid Video – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments seigler1 • September 8, 2023 5:58 PM re The SURVEILLANCE STATE …What specific citizen right does 4th AMENDMENT...
LLMs and Tool Use – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier LLMs and Tool Use Last March, just two weeks after GPT-4 was released, researchers at Microsoft quietly announced a plan...
The Hacker Tool to Get Personal Data from Credit Bureaus – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The new site 404 Media has a good article on how hackers are cheaply getting personal information from credit bureaus:...
Cryptocurrency Startup Loses Encryption Key for Electronic Wallet – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Anonymous • September 6, 2023 7:49 AM “I can’t understand why anyone thinks these technologies are a good...
Inconsistencies in the Common Vulnerability Scoring System (CVSS) – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Interesting research: Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities Abstract: The Common Vulnerability...
Friday Squid Blogging: We’re Genetically Engineering Squid Now – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Is this a good idea? The transparent squid is a genetically altered version of the hummingbird bobtail squid, a species...
Spyware Vendor Hacked – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Spyware Vendor Hacked A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the...
Own Your Own Government Surveillance Van – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier A used government surveillance van is for sale in Chicago: So how was this van turned into a mobile spying...
When Apps Go Rogue – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier When Apps Go Rogue Interesting story of an Apple Macintosh app that went rogue. Basically, it was a good app...
Identity Theft from 1965 Uncovered through Face Recognition – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s...
Remotely Stopping Polish Trains – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Turns out that it’s easy to broadcast radio commands that force Polish trains to stop: …the saboteurs appear to have...
Friday Squid Blogging: China’s Squid Fishing Ban Ineffective – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier China imposed a “pilot program banning fishing in parts of the south-west Atlantic Ocean from July to October, and parts...
Hacking Food Labeling Laws – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to...
Parmesan Anti-Forgery Protection – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Ted • August 24, 2023 8:01 AM Will the real Parmigiano Reggiano please stand up? https://p-chip.com With a...
December’s Reimagining Democracy Workshop – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Imagine that we’ve all—all of us, all of society—landed on some alien planet, and we have to form a government:...
Applying AI to License Plate Surveillance – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier License plate scanners aren’t new. Neither is using them for bulk surveillance. What’s new is that AI is being used...
White House Announces AI Cybersecurity Challenge – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier At Black Hat last week, the White House announced an AI Cyber Challenge. Gizmodo reports: The new AI cyber challenge...
Friday Squid Blogging: Squid Brand Fish Sauce – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Friday Squid Blogging: Squid Brand Fish Sauce Squid Brand is a Thai company that makes fish sauce: It is...
Bots Are Better than Humans at Solving CAPTCHAs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Interesting research: “An Empirical Study & Evaluation of Modern CAPTCHAs“: Abstract: For nearly two decades, CAPTCHAS have been widely used...
Detecting “Violations of Social Norms” in Text with AI – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Detecting “Violations of Social Norms” in Text with AI Researchers are trying to use AI to detect “social norms...
UK Electoral Commission Hacked – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack...
Zoom Can Spy on Your Calls and Use the Conversation to Train AI, But Says That It Won’t – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier This is why we need regulation: Zoom updated its Terms of Service in March, spelling out that the company reserves...
China Hacked Japan’s Military Networks – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The NSA discovered the intrusion in 2020—we don’t know how—and alerted the Japanese. The Washington Post has the story: The...
Friday Squid Blogging: NIWA Annual Squid Survey – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Results from the National Institute of Water and Atmospheric Research Limited annual squid survey: This year, the team unearthed spectacular...
The Inability to Simultaneously Verify Sentience, Location, and Identity – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma” Abstract: Trolls, bots, and sybils distort online discourse and compromise...
Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Clive Robinson • August 10, 2023 10:43 AM @ Bruce, If I remember rightly it was 94 or...