bruceschneier   817

« earlier    

How Facebook Figures Out Everyone You've Ever Met
“Mobile phone numbers are even better than social security numbers for identifying people,” said security technologist Bruce Schneier by email. “People give them out all the time, and they’re strongly linked to identity.”
bruceschneier  facebook  privacy  security  surveillance  kashmirhill 
november 2017 by nowthis
Surveillance Intermediaries - Schneier on Security
"Surveillance intermediaries have the financial and ideological incentives to resist government requests for user data. Their techniques of resistance are: proceduralism and litigiousness that reject voluntary cooperation in favor of minimal complia…
US-politics  BruceSchneier  surveillance  privacy  PrivacyKitStream  facebook  google  apple 
june 2017 by loughlin
Security Trade-offs in the Longbow vs. Crossbow Decision - Schneier on Security
Rulers choosing between missile technologies thus confronted a trade-off with respect to internal and external security.
INTERESTING  innovation  bruceschneier  crossbows 
january 2017 by Walpole
Bruce Schneier: 'The Internet Era of Fun and Games Is Over'
As the chairman pointed out, there are now computers in everything. But I want to suggest another way of thinking about it in that everything is now a computer: This is not a phone. It’s a computer that makes phone calls. A refrigerator is a computer that keeps things cold. ATM machine is a computer with money inside. Your car is not a mechanical device with a computer. It’s a computer with four wheels and an engine… And this is the Internet of Things, and this is what caused the DDoS attack we’re talking about.

Four points:
1. Attack is easier than defense
2. There are new vulnerabilities in the interconnections
3. The internet empowers attackers
4. The economics don’t trickle down
BruceSchneier  security  InternetOfThings  from:TheDailyDot  by:AustinPowell  geo:UnitedStates  politics 
november 2016 by owenblacker
Lessons From the Dyn DDoS Attack
A week ago Friday, someone took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name provider Dyn. DDoS attacks are neither new nor sophisticated. The attacker sends a massive amount of traffic, causing the victim's system to slow to a crawl and eventually crash. There are more or less clever variants, but basically, it's a datapipe-size battle between attacker and victim. If the defender has a larger capacity to receive and process data, he or she will win. If the attacker can throw more data than the victim can process, he or she will win.
security  ddos  dyn  bruceschneier  2016 
november 2016 by Frontrunner
Yesterday's internet-destroying outages were caused by "amateurish" IoT malware / Boing Boing
The attack follows a disturbing pattern: in late September, internet security journalist Brian Krebs faced one of the worst denial of service attacks in history, apparently launched in retaliation for his coverage of a couple of petty crooks from Israel who ran a DoS-for-hire service. The attack originated from IoT devices that had been infected by the Mirai botnet, whose sourcecode was dumped shortly thereafter, revealing it to be a "clumsy, amateurish" piece of code that only succeeded because IoT devices have security that's so bad that it can only be called negligent.


The Krebs attack hit 620 Gbps, the kind of traffic floods normally associated with state actors. They came days after security expert Bruce Schneier revealed that he'd been confidentially apprised of attacks seemingly designed to calibrate a weapon that could shut down the entire internet, presumed to originate in China.
DDoS  hacking  BruceSchneier  BrianKrebs  Internet  botnet  Mirai  by:CoryDoctorow  from:BoingBoing 
october 2016 by owenblacker

« earlier    

related tags

041214  0414  2014  2016  9/11  adamminter  advertising  advice  ai  airport  alqaeda  alshabab  analysis  apple  article  autofill  awareness  behavior  belief  bigdata  biometrics  blog  blogentries  botnet  briankrebs  browser  bruce-schneier  bt  bug  business  by:austinpowell  by:corydoctorow  cellphone  cellular  cert  cfaa  cheating  children  christopherahlberg  civics  closedsource  code  communication  companies  computersecurity  congress  critique  crossbows  crypto  cryptography  cryptoparty  cybercrime  cyberlaw  cybersecurity  data  ddos  democracy  design  diesel  doxing  drivers  driving  dyn  economics  editorial  edwardsnowden  eff  email  embedded  en  encryption  encrzption  evankohlmann  facebook-archive  facebook  facebookpost  facialrecognition  fbi  fear  feedly  flashpointglobalpartners  flying  freedom  from:boingboing  from:thedailydot  future  gao  gchq  geo:unitedstates  gimf  glenngreenwald  gmail  golang  google  government  hack  hackerblogs  hacking  hardware  heartbleed  hjd  homelandsecurity  ibm  innovation  insightful  intelligence  interesting  internet  internetofthings  iot  islamicterrorism  it  jensgrossklags  kashmirhill  keithalexander  kevinbrown  kptibug  lang:en  law  linkfodder  location  malware  matthewfredrikson  meltdown  memri  mikerogers  mirai  mobile  natesilver  nbcnews  network  nicholasrasmussen  nicolaschristin  ninthcircuitcourt  northkorea  nsa  oman  opensource  openssl  opinion  organizations  parenting  password  passwordmanager  passwords  patching  paßwort  personal_net  phishing  phone  placebo  police  politics  privacy  privacykitstream  protocols  psychology  quotes  reaction  read  regulation  reputation  research  risk  risks  safety  samsung  schneier  schneieronsecurity  search  secrecy  security  securitytheatre  sensors  sergeegelman  snowden  software  softwareeatingtheworld  sony  source  spectre  spending  standalone  statistics  stevenstalinsky  storage  subterfuge  subversion  surveillance  survey  tadayoshikohno  technology  terroris  terrorism  theatlantic  theguardian  theinterview  thomasristenpart  timothyvidas  tor  toread  transparency  transportation  trend  trump  trust  tsa  us-politics  us  usa  usability  users  volkswagen  vox  vulnerabilities  vulnerability  wifi  wireless  wiretapping 

Copy this bookmark: