Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Schneier on Security
Page 4
Schneier on Security
Schneier on Security
NSA Buying Bulk Surveillance Data on Americans without a Warrant – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments whoops • January 30, 2024 7:58 AM The...
Schneier on Security
Microsoft Executives Hacked – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Microsoft is reporting that a Russian intelligence agency—the same one...
Schneier on Security
Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her Eggs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her...
Schneier on Security
Chatbots and Human Conversation – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier For most of history, communicating with a computer has not...
Schneier on Security
Quantum Computing Skeptics – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Quantum Computing Skeptics Interesting article. I am also skeptical...
Schneier on Security
Poisoning AI Models – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Poisoning AI Models New research into poisoning AI models: The...
Schneier on Security
Side Channels Are Common – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Really interesting research: “Lend Me Your Ear: Passive Remote Physical...
Schneier on Security
AI Bots on X (Twitter) – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Tom • January 22, 2024 8:12 AM Something...
Schneier on Security
Friday Squid Blogging: New Foods from Squid Fins – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: New Foods from Squid Fins We...
Schneier on Security
Zelle Is Using My Name and Voice without My Consent – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Okay, so this is weird. Zelle has been using my...
Schneier on Security
Speaking to the CIA’s Creative Writing Group – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is a fascinating story. Last spring, a friend of...
Schneier on Security
Canadian Citizen Gets Phone Back from Police – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Canadian Citizen Gets Phone Back from Police After 175...
Schneier on Security
Code Written with AI Assistants Is Less Secure – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting research: “Do Users Write More Insecure Code with AI...
Schneier on Security
The Story of the Mirai Botnet – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Chris Becke • January 16, 2024 8:18 AM...
Schneier on Security
Voice Cloning with Very Short Samples – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Upcoming Speaking Engagements – Source: www.schneier.com
Source: www.schneier.com - Author: B. Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Clive Robinson • January 12, 2024 6:35 PM...
Schneier on Security
On IoT Devices and Software Liability – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New law journal article: Smart Device Manufacturer Liability and Redress...
Schneier on Security
Pharmacies Giving Patient Records to Police without Warrants – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Clive Robinson • January 11, 2024 8:58 AM...
Schneier on Security
Facial Scanning by Burger King in Brazil – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier In 2000, I wrote: “If McDonald’s offered three free Big...
Schneier on Security
PIN-Stealing Android Malware – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is an old piece of malware—the Chameleon Android banking...
Schneier on Security
Second Interdisciplinary Workshop on Reimagining Democracy – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Last month, I convened the Second Interdisciplinary Workshop on Reimagining...
Schneier on Security
Friday Squid Blogging—18th Anniversary Post: New Species of Pygmy Squid Discovered – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Friday Squid Blogging—18th Anniversary Post: New Species of Pygmy Squid...
Schneier on Security
Improving Shor’s Algorithm – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier We don’t have a useful quantum computer yet, but we...
Schneier on Security
New iPhone Exploit Uses Four Zero-Days – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Kaspersky researchers are detailing “an attack that over four years...
Schneier on Security
New iPhone Exploit Uses Four Zero-Days – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Kaspersky researchers are detailing “an attack that over four years...
Schneier on Security
Facial Recognition Systems in the US – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier A helpful summary of which US retail stores are using...
Schneier on Security
TikTok Editorial Analysis – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier TikTok seems to be skewing things in the interests of...
Schneier on Security
AI Is Scarily Good at Guessing the Location of Random Photos – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Wow: To test PIGEON’s performance, I gave it five personal...
Schneier on Security
Friday Squid Blogging: Sqids – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier They’re short unique strings: Sqids (pronounced “squids”) is an open-source...
Posts navigation
1
…
3
4
5
…
16
Latest News
The Hacker News
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources – Source:thehackernews.com
03/05/2024
The Hacker News
Google Announces Passkeys Adopted by Over 400 Million Accounts – Source:thehackernews.com
03/05/2024
Data Breach Today
Critical Flaw in R Language Poses Supply Chain Risk – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Correlating Cyber Investments With Business Outcomes – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Breach Roundup: REvil Hacker Gets Nearly 14-Year Sentence – Source: www.databreachtoday.com
03/05/2024