Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Schneier on Security
Page 2
Schneier on Security
Schneier on Security
Cheating Automatic Toll Booths by Obscuring License Plates – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The Wall Street Journal is reporting on a variety of...
Schneier on Security
AI and the Evolution of Social Media – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Oh, how the mighty have fallen. A decade ago, social...
Schneier on Security
Drones and the US Air Force – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Fascinating analysis of the use of drones on a modern...
Schneier on Security
Friday Squid Blogging: Operation Squid – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments This message will be deleted... • March 15,...
Schneier on Security
Improving C++ – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Improving C++ C++ guru Herb Sutter writes about how we...
Schneier on Security
Automakers Are Sharing Driver Data with Insurers without Consent – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Kasmir Hill has the story: Modern cars are internet-enabled, allowing...
Schneier on Security
Burglars Using Wi-Fi Jammers to Disable Security Cameras – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Jan Doggen • March 13, 2024 7:26 AM...
Schneier on Security
Jailbreaking LLMs with ASCII Art – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Peter A. • March 12, 2024 9:07 AM...
Schneier on Security
Using LLMs to Unredact Text – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Flerfer • March 11, 2024 9:56 AM I’ve...
Schneier on Security
Friday Squid Blogging: New Plant Looks Like a Squid – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Newly discovered plant looks like a squid. And it’s super...
Schneier on Security
Essays from the Second IWORD – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The Ash Center has posted a series of twelve essays...
Schneier on Security
How Public AI Can Strengthen Democracy – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier With the world’s focus turning to misinformation, manipulation, and outright...
Schneier on Security
A Taxonomy of Prompt Injection Attacks – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Researchers ran a global prompt hacking competition, and have documented...
Schneier on Security
Surveillance through Push Notifications – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The Washington Post is reporting on the FBI’s increasing use...
Schneier on Security
The Insecurity of Video Doorbells – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog The Insecurity of Video Doorbells Consumer Reports has analyzed...
Schneier on Security
LLM Prompt Injection Worm – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Researchers have demonstrated a worm that spreads through prompt injection....
Schneier on Security
Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Paleontologists have discovered a 183-million-year-old species of vampire squid. Prior...
Schneier on Security
NIST Cybersecurity Framework 2.0 – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier NIST has released version 2.0 of the Cybersecurity Framework: The...
Schneier on Security
How the “Frontier” Became the Slogan of Uncontrolled AI – Source: www.schneier.com
Source: www.schneier.com - Author: B. Schneier Artificial intelligence (AI) has been billed as the next frontier...
Schneier on Security
A Cyber Insurance Backstop – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier In the first week of January, the pharmaceutical giant Merck...
Schneier on Security
China Surveillance Company Hacked – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog China Surveillance Company Hacked Last week, someone posted something...
Schneier on Security
Apple Announces Post-Quantum Encryption Algorithms for iMessage – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Apple announced PQ3, its post-quantum encryption standard based on the...
Schneier on Security
AIs Hacking Websites – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier AIs Hacking Websites New research: LLM Agents can Autonomously Hack...
Schneier on Security
Friday Squid Blogging: Illex Squid and Climate Change – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier echo • February 23, 2024 6:17 PM Originally I had...
Schneier on Security
New Image/Video Prompt Injection Attacks – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog New Image/Video Prompt Injection Attacks Simon Willison has been...
Schneier on Security
Details of a Phone Scam – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Details of a Phone Scam First-person account of someone...
Schneier on Security
Microsoft Is Spying on Users of Its AI Tools – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Microsoft announced that it caught Chinese, Russian, and Iranian hackers...
Schneier on Security
EU Court of Human Rights Rejects Encryption Backdoors – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The European Court of Human Rights has ruled that breaking...
Schneier on Security
Friday Squid Blogging: Vegan Squid-Ink Pasta – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: Vegan Squid-Ink Pasta It uses black...
Schneier on Security
On the Insecurity of Software Bloat – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Good essay on software bloat and the insecurities it causes....
Posts navigation
1
2
3
…
15
Latest News
The Register Security
Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers – Source: go.theregister.com
18/04/2024
The Register Security
Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims – Source: go.theregister.com
18/04/2024
The Register Security
House passes bill banning Uncle Sam from snooping on citizens via data brokers – Source: go.theregister.com
18/04/2024
The Register Security
Korean researcher details scheme abusing Apple’s third-party pickup policy – Source: go.theregister.com
18/04/2024
The Register Security
185K people’s sensitive data in the pits after ransomware raid on Cherry Health – Source: go.theregister.com
18/04/2024
The Register Security
EU tells Meta it can’t paywall privacy – Source: go.theregister.com
18/04/2024