Live Video of Promachoteuthis Squid
Schneier on Security
by Bruce Schneier
18h ago
The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile. Blog moderation policy ..read more
Visit website
YubiKey Side-Channel Attack
Schneier on Security
by Bruce Schneier
18h ago
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece of security analysis ..read more
Visit website
Long Analysis of the M-209
Schneier on Security
by Bruce Schneier
2d ago
Really interesting analysis of the American M-209 encryption device and its security ..read more
Visit website
Security Researcher Sued for Disproving Government Statements
Schneier on Security
by Bruce Schneier
3d ago
This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about the severity of the breach. A security researcher repeatedly proves their statements to be lies. The city gets mad and sues the researcher. Let’s hope the judge throws the case out, but—still—it will serve as a warning to others ..read more
Visit website
List of Old NSA Training Videos
Schneier on Security
by Bruce Schneier
3d ago
The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a bunch explaining the operations of various cryptographic equipment, and a few code words I have never heard of before ..read more
Visit website
SQL Injection Attack on Airport Security
Schneier on Security
by Bruce Schneier
5d ago
Interesting vulnerability: …a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots and flight attendants to bypass security screening, even when flying on domestic personal trips. The KCM process is fairly simple: the employee uses the dedicated lane and presents their KCM barcode or provides the TSA agent their employee number and airline. Various forms of ID need to be presented while the TSA agent’s laptop verifies the employment status with the airline. If successful, the employee can access the sterile area without any screening at all ..read more
Visit website
Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing
Schneier on Security
by Bruce Schneier
1w ago
Details. Blog moderation policy ..read more
Visit website
Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published
Schneier on Security
by Bruce Schneier
1w ago
The “long lost lecture” by Adm. Grace Hopper has been published by the NSA. (Note that there are two parts.) It’s a wonderful talk: funny, engaging, wise, prescient. Remember that talk was given in 1982, less than a year before the ARPANET switched to TCP/IP and the internet went operational. She was a remarkable person. Listening to it, and thinking about the audience of NSA engineers, I wonder how much of what she’s talking about as the future of computing—miniaturization, parallelization—was being done in the present and in secret ..read more
Visit website
Matthew Green on Telegram’s Encryption
Schneier on Security
by Bruce Schneier
1w ago
Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not ..read more
Visit website
The Present and Future of TV Surveillance
Schneier on Security
by Bruce Schneier
1w ago
Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized ..read more
Visit website

Follow Schneier on Security on FeedSpot

Continue with Google
Continue with Apple
OR