Source: www.schneier.com – Author: Bruce Schneier HomeBlog Belgian Tax Hack Here’s a fascinating tax hack from Belgium (listen to the details here, episode #484 of “No...
Author:
Class-Action Lawsuit for Scraping Data without Permission – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from...
The Password Game – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...
Self-Driving Cars Are Surveillance Cameras on Wheels – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Police are already using self-driving car footage as video evidence: While security cameras are commonplace in American cities, self-driving cars...
Self-Driving Cars Are Surveillance Cameras on Wheels – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier Police are already using self-driving car footage as video evidence: While security cameras are commonplace in American cities, self-driving cars...
Friday Squid Blogging: See-Through Squid – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Friday Squid Blogging: See-Through Squid Doryteuthis opalescens is known as the market squid, and was critical in the recent...
The US Is Spying on the UN Secretary General – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The Washington Post is reporting that the US is spying on the UN Secretary General. The reports on Guterres appear...
Redacting Documents with a Black Sharpie Doesn’t Work – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier We have learned this lesson again: As part of the FTC v. Microsoft hearing, Sony supplied a document from PlayStation...
Stalkerware Vendor Hacked – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The stalkerware company LetMeSpy has been hacked: TechCrunch reviewed the leaked data, which included years of victims’ call logs and...
Typing Incriminating Evidence in the Memo Field – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Don’t do it: Recently, the manager of the Harvard Med School morgue was accused of stealing and selling human body...
Excel Data Forensics – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Clive Robinson • June 26, 2023 12:10 PM @ Bruce, “And, yes, an author of a paper on...
Friday Squid Blogging: Giggling Squid – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments ResearcherZero • June 23, 2023 5:30 PM ‘http://www.fortiguard.com/psirt/FG-IR-23-074 “Security experts say CISA’s directive highlights the reality that cyberspies...
UPS Data Harvested for SMS Phishing Attacks – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Jorgem • June 23, 2023 12:18 PM UPS discovered a method by which a person who searched for...
AI as Sensemaking for Public Comments – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier It’s become fashionable to think of artificial intelligence as an inherently dehumanizing technology, a ruthless force of automation that has...
AI as Sensemaking for Public Comments – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier It’s become fashionable to think of artificial intelligence as an inherently dehumanizing technology, a ruthless force of automation that has...
Ethical Problems in Computer Security – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “Ethical Frameworks...
Power LED Side-Channel Attack – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier This is a clever new side-channel attack: The first attack uses an Internet-connected surveillance camera to take a high-speed video...
Security and Human Behavior (SHB) 2023 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier I’m just back from the sixteenth Workshop on Security and Human Behavior, hosted by Alessandro Acquisti at Carnegie Mellon University...
Friday Squid Blogging: Squid Can Edit Their RNA – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier This is just crazy: Scientists don’t yet know for sure why octopuses, and other shell-less cephalopods including squid and cuttlefish,...
Security and Human Behavior (SHB) 2023 – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier I’m just back from the sixteenth Workshop on Security and Human Behavior, hosted by Alessandro Acquisti at Carnegie Mellon University...
On the Need for an AI Public Option – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Artificial intelligence will bring great benefits to all of humanity. But do we really want to entrust this revolutionary technology...
Identifying the Idaho Killer – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The New York Times has a long article on the investigative techniques used to identify the person who stabbed and...
AI-Generated Steganography – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information...
Friday Squid Blogging: Light-Emitting Squid – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier You have been rate-limited for making too many requests in a short time frame. Website owner? If you think you...
Operation Triangulation: Zero-Click iPhone Malware – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Kaspersky is reporting a zero-click iOS exploit in the wild: Mobile device backups contain a partial copy of the filesystem,...
Paragon Solutions Spyware: Graphite – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Paragon Solutions is yet another Israeli spyware company. Their product is called “Graphite,” and is a lot like NSO Group’s...
How Attorneys Are Harming Cybersecurity Incident Response – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier New paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“: Abstract: Incident Response (IR) allows...
Snowden Ten Years Later – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Snowden Ten Years Later In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the...
The Software-Defined Car – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Developers are starting to talk about the software-defined car. For decades, features have accumulated like cruft in new vehicles: a...
Friday Squid Blogging: Squid Chromolithographs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...