schneier   2008

« earlier    

SpiderOak's Warrant Canary Died - Schneier on Security
BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace the warrant canary with a transparency report, they would have written something explaining their decision. via Pocket
IFTTT  Pocket  schneier  on  security 
6 days ago by fdlbt
Conservation of Threat - Schneier on Security
Here's some interesting research about how we perceive threats. Basically, as the environment becomes safer we basically manufacture new threats. From an essay about the research: via Pocket
IFTTT  Pocket  schneier  on  security 
6 weeks ago by fdlbt
Facebook and Cambridge Analytica - Schneier on Security
In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. via Pocket
IFTTT  Pocket  schneier  on  security 
april 2018 by fdlbt
Cellebrite Unlocks iPhones for the US Government - Schneier on Security
Cellebrite, a Petah Tikva, Israel-based vendor that's become the U.S. government's company of choice when it comes to unlocking mobile devices, is this month telling customers its engineers currently have the ability to get around the security of devices running iOS 11. via Pocket
IFTTT  Pocket  schneier  on  security 
february 2018 by fdlbt
Spectre and Meltdown Attacks Against Microprocessors - Schneier on Security
The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. via Pocket
IFTTT  Pocket  schneier  on  security 
january 2018 by fdlbt
On the Equifax Data Breach - Schneier on Security
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. via Pocket
IFTTT  Pocket  schneier  on  security 
october 2017 by fdlbt
New KRACK Attack Against Wi-Fi Encryption - Schneier on Security
Mathy Vanhoef has just published a devastating attack against WPA2, the 14-year-old encryption protocol used by pretty much all wi-fi systems. Its an interesting attack, where the attacker forces the protocol to reuse a key. The authors call this attack KRACK, for Key Reinstallation Attacks via Pocket
IFTTT  Pocket  schneier  on  security 
october 2017 by fdlbt
Changes in Password Best Practices - Schneier on Security
NIST recently published its four-volume SP800-63-3 Digital Identity Guidelines. Among other things, it makes three important suggestions when it comes to passwords: These password rules were failed attempts to fix the user. Better we fix the security systems. via Pocket
IFTTT  Pocket  schneier  on  security 
october 2017 by fdlbt
The Data Tinder Collects, Saves, and Uses - Schneier on Security
It's not Tinder. Surveillance is the business model of the Internet. Everyone does this.
Tinder  surveillance  privacy  data  review  Schneier  2017  via:inspiral 
october 2017 by Librarysue

« earlier    

related tags

080717  0817  201  2016  2017  advertising  airport  algorithm  anonymisation  anonymity  anonymous  apple  asia  asset  author:bruceschneier  awareness  bace  big-brother  big-business  big-data  bigdata  blag  board  bookmarks_bar  bruce  business  capitalism  cfaa  charles  china  citizenlab  clinton  cloud  computersecurity  congress  crypto  cybersecurity  daniel  data  ddos  deanonymise  delicious  directors  dmca  ecuador  encryption  equifax  espionage  ethiopia  evil_maid  facebook  fbi  fcc  fr  fraud  freedom  funny  geer  gutmann  hack  hacking  humour  idiocy  ifttt  indie  informatiebeveiliging  infosec  infrared  internet  internetofshit  internetofthings  iot  iran  john  kazakhstan  laptop  leak  liability  malaysia  manager  market-failure  metzger  mfa  mindset  mobile  monopoly  motivated  motivation  movingforward  ndl301  nist  nsa  on  otf  ovum  p.  paranoia  password  passwords  perry  peter  pfleeger  philosophy  pocket  politics  priorities  priority  privacy  propaganda  quarterman  radar  rebecca  regulation  review  russia  s.  scared  security  simon  sms  social-engineering  sociotechnical  software  softwareupdate  speck  stl  strategy  sudan  surveillance  syria  tech&society  techdel  technology  technology_dependence  terrorism  thinking  tibet  tinder  tor  toxic  trump  tsa  uae  usa  via  voting  wikileaks  wikipedia 

Copy this bookmark: