Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Schneier on Security
Page 6
Schneier on Security
Schneier on Security
On Robots Killing People – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The robot revolution began long ago, and so did the...
Schneier on Security
Friday Squid Blogging: Glass Squid Video – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments seigler1 • September 8, 2023 5:58 PM re...
Schneier on Security
LLMs and Tool Use – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier LLMs and Tool Use Last March, just two weeks after...
Schneier on Security
The Hacker Tool to Get Personal Data from Credit Bureaus – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The new site 404 Media has a good article on...
Schneier on Security
Cryptocurrency Startup Loses Encryption Key for Electronic Wallet – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Anonymous • September 6, 2023 7:49 AM “I...
Schneier on Security
Inconsistencies in the Common Vulnerability Scoring System (CVSS) – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting research: Shedding Light on CVSS Scoring Inconsistencies: A User-Centric...
Schneier on Security
Friday Squid Blogging: We’re Genetically Engineering Squid Now – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Is this a good idea? The transparent squid is a...
Schneier on Security
Spyware Vendor Hacked – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Spyware Vendor Hacked A Brazilian spyware app vendor was hacked...
Schneier on Security
Own Your Own Government Surveillance Van – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier A used government surveillance van is for sale in Chicago:...
Schneier on Security
When Apps Go Rogue – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier When Apps Go Rogue Interesting story of an Apple Macintosh...
Schneier on Security
Identity Theft from 1965 Uncovered through Face Recognition – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of...
Schneier on Security
Remotely Stopping Polish Trains – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Turns out that it’s easy to broadcast radio commands that...
Schneier on Security
Friday Squid Blogging: China’s Squid Fishing Ban Ineffective – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier China imposed a “pilot program banning fishing in parts of...
Schneier on Security
Hacking Food Labeling Laws – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This article talks about new Mexican laws about food labeling,...
Schneier on Security
Parmesan Anti-Forgery Protection – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Ted • August 24, 2023 8:01 AM Will...
Schneier on Security
December’s Reimagining Democracy Workshop – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Imagine that we’ve all—all of us, all of society—landed on...
Schneier on Security
Applying AI to License Plate Surveillance – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier License plate scanners aren’t new. Neither is using them for...
Schneier on Security
White House Announces AI Cybersecurity Challenge – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier At Black Hat last week, the White House announced an...
Schneier on Security
Friday Squid Blogging: Squid Brand Fish Sauce – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: Squid Brand Fish Sauce Squid Brand...
Schneier on Security
Bots Are Better than Humans at Solving CAPTCHAs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting research: “An Empirical Study & Evaluation of Modern CAPTCHAs“:...
Schneier on Security
Detecting “Violations of Social Norms” in Text with AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Detecting “Violations of Social Norms” in Text with AI...
Schneier on Security
UK Electoral Commission Hacked – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The UK Electoral Commission discovered last year that it was...
Schneier on Security
Zoom Can Spy on Your Calls and Use the Conversation to Train AI, But Says That It Won’t – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is why we need regulation: Zoom updated its Terms...
Schneier on Security
China Hacked Japan’s Military Networks – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The NSA discovered the intrusion in 2020—we don’t know how—and...
Schneier on Security
Friday Squid Blogging: NIWA Annual Squid Survey – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Results from the National Institute of Water and Atmospheric Research...
Schneier on Security
The Inability to Simultaneously Verify Sentience, Location, and Identity – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma”...
Schneier on Security
Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Clive Robinson • August 10, 2023 10:43 AM...
Schneier on Security
Using Machine Learning to Detect Keystrokes – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Researchers have trained a ML model to detect keystrokes by...
Schneier on Security
You Can’t Rush Post-Quantum-Computing Cryptography Standards – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier I just read an article complaining that NIST is taking...
Schneier on Security
Microsoft Signing Key Stolen by Chinese – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier A bunch of networks, including US Government networks, have been...
Posts navigation
1
…
5
6
7
…
16
Latest News
The Register Security
Kaspersky hits back at claims its AI helped Russia develop military drone systems – Source: go.theregister.com
04/05/2024
The Hacker News
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities – Source:thehackernews.com
04/05/2024
Data Breach Today
How Intel 471’s Buy of Cyborg Is Reshaping Threat Hunting – Source: www.databreachtoday.com
04/05/2024
Data Breach Today
Code to Cloud Roadshow – Tysons Corner In-Person Event hosted by Palo Alto Networks – Source: www.databreachtoday.com
04/05/2024
Data Breach Today
Regulating AI: ‘It’s Going to Be a Madhouse’ – Source: www.databreachtoday.com
04/05/2024
Data Breach Today
Web Trackers Persist in Healthcare Despite Privacy Risks – Source: www.databreachtoday.com
04/05/2024