Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
Home
Schneier on Security
Page 13
Schneier on Security
Schneier on Security
Publisher’s Weekly Review of A Hacker’s Mind
Publisher’s Weekly Review of A Hacker’s Mind Publisher’s Weekly reviewed A Hacker’s Mind—and it’s a starred...
Schneier on Security
Friday Squid Blogging: Another Giant Squid Captured on Video
Friday Squid Blogging: Another Giant Squid Captured on Video Here’s a new video of a giant...
Schneier on Security
No-Fly List Exposed
No-Fly List Exposed I can’t remember the last time I thought about the US no-fly list:...
Schneier on Security
Bulk Surveillance of Money Transfers
Bulk Surveillance of Money Transfers Just another obscure warrantless surveillance program. US law enforcement can access...
Schneier on Security
US Cyber Command Operations During the 2022 Midterm Elections
US Cyber Command Operations During the 2022 Midterm Elections The head of both US Cyber Command...
Schneier on Security
On Alec Baldwin’s Shooting
On Alec Baldwin’s Shooting We recently learned that Alec Baldwin is being charged with involuntary manslaughter...
Schneier on Security
LastPass Breach
LastPass Breach Last August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised....
Schneier on Security
Arresting IT Administrators
Arresting IT Administrators This is one way of ensuring that IT keeps up with patches: Albanian...
Schneier on Security
Friday Squid Blogging: Injured Giant Squid and Paddleboarder
Friday Squid Blogging: Injured Giant Squid and Paddleboarder Here’s a video—I don’t know where it’s from—of...
Schneier on Security
Hacking the JFK Airport Taxi Dispatch System
Hacking the JFK Airport Taxi Dispatch System Two men have been convicted of hacking the taxi...
Schneier on Security
Trojaned Windows Installer Targets Ukraine
Trojaned Windows Installer Targets Ukraine Mandiant is reporting on a trojaned Windows installer that targets Ukrainian...
Schneier on Security
Ukraine Intercepting Russian Soldiers’ Cell Phone Calls
Ukraine Intercepting Russian Soldiers’ Cell Phone Calls They’re using commercial phones, which go through the Ukrainian...
Schneier on Security
Critical Microsoft Code-Execution Vulnerability
Critical Microsoft Code-Execution Vulnerability A critical code-execution vulnerability in Microsoft Windows was patched in September. It...
Schneier on Security
How to Surrender to a Drone
How to Surrender to a Drone The Ukrainian army has released an instructional video explaining how...
Schneier on Security
Apple Patches iPhone Zero-Day
Apple Patches iPhone Zero-Day The most recent iPhone update—to version 16.1.2—patches a zero-day vulnerability that “may...
Schneier on Security
As Long as We’re on the Subject of CAPTCHAs
As Long as We’re on the Subject of CAPTCHAs There are these. Leer másSchneier on Security...
Schneier on Security
Friday Squid Blogging: Squid in Concert
Friday Squid Blogging: Squid in Concert Squid is performing a concert in London in February. If...
Schneier on Security
Obligatory ChatGPT Post
Obligatory ChatGPT Post Seems like absolutely everyone everywhere is playing with Chat GPT. So I did,...
Schneier on Security
Hacking Boston’s CharlieCard
Hacking Boston’s CharlieCard Interesting discussion of vulnerabilities and exploits against Boston’s CharlieCard. Leer másSchneier on Security...
Schneier on Security
Reimagining Democracy
Reimagining Democracy Last week, I hosted a two-day workshop on reimagining democracy. The idea was to...
Schneier on Security
A Security Vulnerability in the KmsdBot Botnet
A Security Vulnerability in the KmsdBot Botnet Security researchers found a software bug in the KmsdBot...
Schneier on Security
CryWiper Data Wiper Targeting Russian Sites
CryWiper Data Wiper Targeting Russian Sites Kaspersky is reporting on a data wiper masquerading as ransomware...
Schneier on Security
Security Vulnerabilities in Eufy Cameras
Security Vulnerabilities in Eufy Cameras Eufy cameras claim to be local only, but upload data to...
Schneier on Security
Leaked Signing Keys Are Being Used to Sign Malware
Leaked Signing Keys Are Being Used to Sign Malware A bunch of Android OEM signing keys...
Schneier on Security
The Decoupling Principle
The Decoupling Principle This is a really interesting paper that discusses what the authors call the...
Schneier on Security
Friday Squid Blogging: China Bans Taiwanese Squid Imports
Friday Squid Blogging: China Bans Taiwanese Squid Imports Today I have some squid geopolitical news. As...
Schneier on Security
Hacking Trespass Law
Hacking Trespass Law This article talks about public land in the US that is completely surrounded...
Schneier on Security
Apple Is Finally Encrypting iCloud Backups
Apple Is Finally Encrypting iCloud Backups After way too many years, Apple is finally encrypting iCloud...
Schneier on Security
LastPass Security Breach
LastPass Security Breach The company was hacked, and customer information accessed. No passwords were compromised. Leer...
Schneier on Security
Existential Risk and the Fermi Paradox
Existential Risk and the Fermi Paradox We know that complexity is the worst enemy of security,...
Posts navigation
1
…
12
13
14
…
16
Latest News
The Register Security
Auction house Christie’s confirms criminals stole some client data – Source: go.theregister.com
28/05/2024
The Register Security
Take two APIs and call me in the morning: How healthcare research can cure cyber crime – Source: go.theregister.com
28/05/2024
The Register Security
How’s Uncle Sam getting on with Biden’s AI exec order? Pretty good, we’re told – Source: go.theregister.com
28/05/2024
securelist.com
Trusted relationship attacks: trust, but verify – Source: securelist.com
28/05/2024
securelist.com
Message board scams – Source: securelist.com
27/05/2024
securelist.com
Threat landscape for industrial automation systems, Q1 2024 – Source: securelist.com
27/05/2024