Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
Typing Incriminating Evidence in the Memo Field – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Don’t do it: Recently, the manager of the Harvard Med...
Schneier on Security
Excel Data Forensics – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Clive Robinson • June 26, 2023 12:10 PM...
Schneier on Security
Friday Squid Blogging: Giggling Squid – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments ResearcherZero • June 23, 2023 5:30 PM ‘http://www.fortiguard.com/psirt/FG-IR-23-074...
Schneier on Security
UPS Data Harvested for SMS Phishing Attacks – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Jorgem • June 23, 2023 12:18 PM UPS...
Schneier on Security
AI as Sensemaking for Public Comments – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier It’s become fashionable to think of artificial intelligence as an...
Schneier on Security
Ethical Problems in Computer Security – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper...
Schneier on Security
Power LED Side-Channel Attack – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is a clever new side-channel attack: The first attack...
Schneier on Security
Friday Squid Blogging: Squid Can Edit Their RNA – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is just crazy: Scientists don’t yet know for sure...
Schneier on Security
Security and Human Behavior (SHB) 2023 – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier I’m just back from the sixteenth Workshop on Security and...
Schneier on Security
On the Need for an AI Public Option – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Artificial intelligence will bring great benefits to all of humanity....
Schneier on Security
Identifying the Idaho Killer – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The New York Times has a long article on the...
Schneier on Security
AI-Generated Steganography – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New research suggests that AIs can produce perfectly secure steganographic...
Schneier on Security
Friday Squid Blogging: Light-Emitting Squid – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier You have been rate-limited for making too many requests in...
Schneier on Security
Operation Triangulation: Zero-Click iPhone Malware – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Kaspersky is reporting a zero-click iOS exploit in the wild:...
Schneier on Security
Paragon Solutions Spyware: Graphite – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Paragon Solutions is yet another Israeli spyware company. Their product...
Schneier on Security
How Attorneys Are Harming Cybersecurity Incident Response – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New paper: “Lessons Lost: Incident Response in the Age of...
Schneier on Security
Snowden Ten Years Later – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Snowden Ten Years Later In 2013 and 2014, I wrote...
Schneier on Security
The Software-Defined Car – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Developers are starting to talk about the software-defined car. For...
Schneier on Security
Friday Squid Blogging: Squid Chromolithographs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Open-Source LLMs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Open-Source LLMs In February, Meta released its large language model:...
Schneier on Security
On the Catastrophic Risk of AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Earlier this week, I signed on to a short group...
Schneier on Security
Chinese Hacking of US Critical Infrastructure – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Chinese Hacking of US Critical Infrastructure Everyone is writing...
Schneier on Security
Brute-Forcing a Fingerprint Reader – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier It’s neither hard nor expensive: Unlike password authentication, which requires...
Schneier on Security
Friday Squid Blogging: Online Cephalopod Course – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: Online Cephalopod Course Atlas Obscura has...
Schneier on Security
Expeditionary Cyberspace Operations – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Cyberspace operations now officially has a physical dimension, meaning that...
Schneier on Security
On the Poisoning of LLMs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given...
Schneier on Security
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws It’s...
Schneier on Security
Credible Handwriting Machine – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier In case you don’t have enough to worry about, someone...
Schneier on Security
Google Is Not Deleting Old YouTube Videos – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Google Is Not Deleting Old YouTube Videos Google has...
Schneier on Security
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in...
Posts navigation
1
…
11
12
13
…
19
Latest News
securityweek.com
Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US – Source: www.securityweek.com
06/02/2025
securityweek.com
How Agentic AI will be Weaponized for Social Engineering Attacks – Source: www.securityweek.com
06/02/2025
The Register Security
Democrats demand to know WTF is up with that DOGE server on OPM’s network – Source: go.theregister.com
06/02/2025
The Register Security
Robocallers who phoned the FCC pretending to be from the FCC land telco in trouble – Source: go.theregister.com
06/02/2025
The Register Security
Mixing Rust and C in Linux likened to cancer by kernel maintainer – Source: go.theregister.com
06/02/2025
The Register Security
DOGE latest: Citrix supremo has ‘read-only’ access to US Treasury payment system – Source: go.theregister.com
06/02/2025