Schneier on Security

Syndicate content
A blog covering security and security technology. Movable Type Pro
Updated: 6 years 3 weeks ago

Zeynep Tufekci on Facebook and Cambridge Analytica

Fri, 03/23/2018 - 21:21
Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book manuscript is due on Monday (finally!), and 2) I knew Zeynep would say what I would say, only better.... Bruce Schneier
Categories: Security

GreyKey iPhone Unlocker

Fri, 03/23/2018 - 13:28
Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know whether sales are limited to US law enforcement, or if it is also selling in other parts of the world. Regardless of that, it's highly likely that these devices will ultimately end... Bruce Schneier
Categories: Security

Reverse Engineering the Cuban Sonic Weapon

Thu, 03/22/2018 - 16:43
Interesting analysis and speculation.... Bruce Schneier
Categories: Security

Hijacking Computers for Cryptocurrency Mining

Wed, 03/21/2018 - 13:27
Interesting paper "A first look at browser-based cryptojacking": Abstract: In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code-bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or... Bruce Schneier
Categories: Security

Dan Geer on the Dangers of Computer-Only Systems

Tue, 03/20/2018 - 13:00
A good warning, delivered in classic Dan Geer style.... Bruce Schneier
Categories: Security

Israeli Security Attacks AMD by Publishing Zero-Day Exploits

Mon, 03/19/2018 - 13:27
Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper, cool vulnerability names -- RYZENFALL, MASTERKEY, FALLOUT, and CHIMERA -- and logos we've come to expect from these sorts of things. What's new is that the company only gave AMD a day's notice, which breaks... Bruce Schneier
Categories: Security

Friday Squid Blogging: New Squid Species Discovered in Australia

Fri, 03/16/2018 - 23:10
A new species of pygmy squid was discovered in Western Australia. It's pretty cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.... Bruce Schneier
Categories: Security

Interesting Article on Marcus Hutchins

Fri, 03/16/2018 - 13:12
This is a good article on the complicated story of hacker Marcus Hutchins.... Bruce Schneier
Categories: Security

Artificial Intelligence and the Attack/Defense Balance

Thu, 03/15/2018 - 13:16
Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things. You can divide Internet security tasks into two sets: what humans do well... Bruce Schneier
Categories: Security

The 600+ Companies PayPal Shares Your Data With

Wed, 03/14/2018 - 13:24
One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here's a good visualization of that data.... Bruce Schneier
Categories: Security

E-Mailing Private HTTPS Keys

Tue, 03/13/2018 - 13:31
I don't know what to make of this story: The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec. It was sent to Jeremy Rowley, an executive vice president at DigiCert, a certificate authority that acquired Symantec's certificate issuance business after Symantec... Bruce Schneier
Categories: Security

Greyshift Sells Phone Unlocking Services

Mon, 03/12/2018 - 21:27
Here's another company that claims to unlock phones for a price.... Bruce Schneier
Categories: Security

Two New Papers on the Encryption Debate

Mon, 03/12/2018 - 13:27
Seems like everyone is writing about encryption and backdoors this season. "Policy Approaches to the Encryption Debate," R Street Policy Study #133, by Charles Duan, Arthur Rizer, Zach Graves and Mike Godwin. "Encryption Policy in Democratic Regimes," East West Institute. I recently blogged about the new National Academies report on the same topic. Here's a review of the National Academies... Bruce Schneier
Categories: Security

Friday Squid Blogging: Interesting Interview

Sat, 03/10/2018 - 00:22
Here's an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.... Bruce Schneier
Categories: Security

OURSA Conference

Fri, 03/09/2018 - 14:24
Responding to the lack of diversity at the RSA Conference, a group of security experts have announced a competing one-day conference: OUR Security Advocates, or OURSA. It's in San Francisco, and it's during RSA, so you can attend both.... Bruce Schneier
Categories: Security

History of the US Army Security Agency

Thu, 03/08/2018 - 14:29
Interesting history of the US Army Security Agency in the early years of Cold War Germany.... Bruce Schneier
Categories: Security

New DDoS Reflection-Attack Variant

Wed, 03/07/2018 - 14:23
This is worrisome: DDoS vandals have long intensified their attacks by sending a small number of specially designed data packets to publicly available services. The services then unwittingly respond by sending a much larger number of unwanted packets to a target. The best known vectors for these DDoS amplification attacks are poorly secured domain name system resolution servers, which magnify... Bruce Schneier
Categories: Security

Security Vulnerabilities in Smart Contracts

Tue, 03/06/2018 - 14:18
Interesting research: "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale": Abstract: Smart contracts -- stateful executable objects hosted on blockchains like Ethereum -- carry billions of dollars worth of coins and cannot be updated once deployed. We present a new systematic characterization of a class of trace vulnerabilities, which result from analyzing multiple invocations of a contract over its... Bruce Schneier
Categories: Security

Intimate Partner Threat

Mon, 03/05/2018 - 19:13
Princeton's Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice is to prevent additional access -- delete your insecure account, open a new one, change your password. This advice is such standard protocol for personal security that it's almost a no-brainer. But in abusive... Bruce Schneier
Categories: Security

Extracting Secrets from Machine Learning Systems

Mon, 03/05/2018 - 13:20
This is fascinating research about how the underlying training data for a machine-learning system can be inadvertently exposed. Basically, if a machine-learning system trains on a dataset that contains secret information, in some cases an attacker can query the system to extract that secret information. My guess is that there is a lot more research to be done here. EDITED... Bruce Schneier
Categories: Security

eXTReMe Tracker