15
nových článků - klikněte pro zobrazení

Bruce Schneier

Popis:

A blog covering security and security technology.

URL:

http://www.schneier.com/blog/

Katalog:

Tech → Bezpečnost
Technology → Security

Publikuje:

7,7 položek/týden

Friday Squid Blogging: Squid Purses

0:29
Squid-shaped purses for sale. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here .

My TED Talks

3.května
I have spoken at several TED conferences over the years. TEDxPSU 2010: “ Reconceptualizing Security ” TEDxCambridge 2013: “ The Battle for Power on the Internet ” TEDMed 2016: “ Who Controls Your Medical Data ?” I’m putting this here because I want all three links in one place.

Rare Interviews with Enigma Cryptanalyst Marian Rejewski

3.května
The Polish Embassy has posted a series of short interview segments with Marian Rejewski, the first person to crack the Enigma. Details from his biography .

The UK Bans Default Passwords

2.května
The UK is the first country to ban default passwords on IoT devices. On Monday, the United Kingdom became the first country in the world to ban default guessable usernames and passwords from these IoT devices. Unique passwords installed by default are still permitted. The Product Security and Telecommunications Infrastructure Act 2022 (PSTI) introduces new minimum-security standards for manufacturers, and demands that these companies are open with consumers about how long their products will re…

AI Voice Scam

1.května
Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her.

WhatsApp in India

30.dubna
Meta has threatened to pull WhatsApp out of India if the courts try to force it to break its end-to-end encryption.

Whale Song Code

29.dubna
During the Cold War, the US Navy tried to make a secret code out of whale song. The basic plan was to develop coded messages from recordings of whales, dolphins, sea lions, and seals. The submarine would broadcast the noises and a computer—the Combo Signal Recognizer (CSR)—would detect the specific patterns and decode them on the other end. In theory, this idea was relatively simple. As work progressed, the Navy found a number of complicated problems to overcome, the bulk of which centered on t…

Friday Squid Blogging: Searching for the Colossal Squid

26.dubna
A cruise ship is searching for the colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here .

Long Article on GM Spying on Its Cars’ Drivers

26.dubna
Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.

The Rise of Large-Language-Model Optimization

25.dubna
The web has become so interwoven with everyday life that it is easy to forget what an extraordinary accomplishment and treasure it is. In just a few decades, much of human knowledge has been collectively written up and made available to anyone with an internet connection. But all of this is coming to an end. The advent of AI threatens to destroy the complex online ecosystem that allows writers, artists, and other creators to reach human audiences. To understand why, you must understand publishi…
© 2000-2024 ANNECA s.r.o., Klíšská 977/77, 400 01 Ústí nad Labem, Tel: +420 478571021, Email: info@hearea.com, Twitter: @hreader