schneier   1995

« earlier    

On the Equifax Data Breach - Schneier on Security
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. via Pocket
IFTTT  Pocket  schneier  on  security 
7 weeks ago by fdlbt
New KRACK Attack Against Wi-Fi Encryption - Schneier on Security
Mathy Vanhoef has just published a devastating attack against WPA2, the 14-year-old encryption protocol used by pretty much all wi-fi systems. Its an interesting attack, where the attacker forces the protocol to reuse a key. The authors call this attack KRACK, for Key Reinstallation Attacks via Pocket
IFTTT  Pocket  schneier  on  security 
7 weeks ago by fdlbt
Changes in Password Best Practices - Schneier on Security
NIST recently published its four-volume SP800-63-3 Digital Identity Guidelines. Among other things, it makes three important suggestions when it comes to passwords: These password rules were failed attempts to fix the user. Better we fix the security systems. via Pocket
IFTTT  Pocket  schneier  on  security 
8 weeks ago by fdlbt
The Data Tinder Collects, Saves, and Uses - Schneier on Security
It's not Tinder. Surveillance is the business model of the Internet. Everyone does this.
Tinder  surveillance  privacy  data  review  Schneier  2017  via:inspiral 
10 weeks ago by Librarysue
The Data Tinder Collects, Saves, and Uses - Schneier on Security
It's not Tinder. Surveillance is the business model of the Internet. Everyone does this.
Tinder  surveillance  privacy  data  review  Schneier  2017 
10 weeks ago by inspiral
Apple's FaceID - Schneier on Security
This is a good interview with Apple's SVP of Software Engineering about FaceID. Honestly, I don't know what to think. I am confident that Apple is not collecting a photo database, but not optimistic that it can't be hacked with fake faces. via Pocket
IFTTT  Pocket  schneier  on  security 
11 weeks ago by fdlbt
The US Senate Is Using Signal - Schneier on Security
The US Senate just approved Signal for staff use. Signal is a secure messaging app with no backdoor, and no large corporate owner who can be pressured to install a backdoor. Susan Landau comments. via Pocket
IFTTT  Pocket  schneier  on  security 
may 2017 by fdlbt
Infrastructure vulnerabilities make surveillance easy - @schneierblog
Though surveillance is a regular part of our societal discourse, "...[l]ess discussed is how many of these same surveillance techniques are used by other - smaller and poorer - more totalitarian countries to spy on political opponents, dissidents, human rights defenders; the press in Toronto has documented some of the many abuses, by countries like Ethiopia , the UAE, Iran, Syria, Kazakhstan , Sudan, Ecuador, Malaysia, and China.

That these countries can use network surveillance technologies to violate human rights is a shame on the world, and there's a lot of blame to go around." - Bruce Schneier for Al Jazeera
otf  schneier  security  surveillance  ethiopia  uae  iran  syria  Kazakhstan  sudan  ecuador  malaysia  china  awareness 
april 2017 by dmcdev

« earlier    

related tags

080717  0817  201  2016  2017  advertising  airport  algorithm  anonymisation  anonymity  anonymous  apple  asia  asset  author:bruceschneier  awareness  bace  bank_notes  berkman  big-brother  big-business  big-data  bigdata  blag  board  bookmarks_bar  bruce  business  capitalism  cash  cfaa  charles  china  citizenlab  clinton  cloud  computersecurity  congress  crypto  cybersecurity  daniel  data  ddos  deanonymise  delicious  democracy.technology  directors  dmca  ecuador  encryption  equifax  espionage  essay  ethiopia  evil_maid  fbi  fcc  fraud  freedom  funny  futurism  geer  government  gutmann  hack  hacking  harvard  humour  idiocy  ifttt  indie  infosec  intelligence  internet  internetofshit  internetofthings  iot  iphone  iran  john  kazakhstan  laptop  leak  liability  malaysia  manager  marijuana  market-failure  metzger  mindset  mobile  monopoly  motivated  motivation  movingforward  ndl301  nsa  on  otf  ovum  p.  paranoia  password  passwords  perry  peter  pfleeger  philosophy  pocket  politics  politik  priorities  priority  privacy  propaganda  quantum_computing  quarterman  radar  rebecca  regulation  research  review  robots  russia  s.  scared  security  simon  social-engineering  sociotechnical  software  softwareupdate  speck  stl  strategy  study  sudan  surveillance  syria  tech&society  techdel  technology  technology_dependence  terrorism  thinking  tibet  tinder  tor  toxic  trump  uae  usa  via  voting  wikileaks  wikipedia 

Copy this bookmark:



description:


tags: