Bruce Schneier

TNS Guide: How to Manage Passwords and Keep Your Online Accounts Secure

Massive data breaches over the past several years have shown that you can’t trust online service providers to keep your account information secure. …

Security

US intelligence can’t break vulnerability hoarding habit

US intelligence agencies are, according to the White House, about to become more “transparent” about the process they follow in deciding what to do …

National Security Agency (NSA)

Consumers Want IoT Toys Regardless of Security, Survey Finds

As Black Friday and Cyber Monday approach, American consumers are likely to be buying more connected Internet of Thing (IoT) toys and devices in 2017 …

Enterprise Tech

SecTor Highlights Need for More Trust and Cyber-Security Regulations

The need for continued evolution of cyber-security technologies and approaches was a key theme at the 11th edition of the SecTor security conference …

Cybersecurity

Shadow Brokers cause ongoing headache for NSA

It’s not been a great few years for the NSA when it comes to breaches.<p>Of course, the highest profile breach by far was caused by Edward Snowden, the …

Security

IBM's Schneier: It's Time to Regulate IoT to Improve Cyber-Security

TORONTO—The time has come for the U.S. government and other governments around the world to start regulating internet of things (IoT) security, …

Cybersecurity

FBI “should not be reluctant” to challenge encryption in court

The 2016 FBI vs Apple battle in federal court over government access to encrypted devices never settled the issue. When a contractor hired by the FBI …

Privacy

What is Blockchain? The Most Disruptive Tech in Decades

Blockchain is poised to change IT in much the same way open-source software did a quarter of a century ago. And in the same way that Linux took more …

Bitcoin

WikiLeaks publishes code and analysis of CIA hacking tool

Whistle-blowing organisation WikiLeaks has begun a new series of leaks of the source code of software allegedly designed to run on servers controlled …

Security

Data Sheet—At Long Last, Flying Cars Are on the Way (Probably)

NEWSWORTHY<p><b>Snap back.</b> <b>Snap’s</b> stock price is snapping back a bit after it revealed that Chinese Internet giant <b>Tencent</b> has upped its stake in the company …

Tech Industry

How Facebook Figures Out Everyone You've Ever Met

In real life, in the natural course of conversation, it is not uncommon to talk about a person you may know. You meet someone and say, “I’m from …

Electric Vehicles

The 50 Best Information Security Blogs

The information security landscape is always evolving. With new products consistently coming onto the market—and new breaches and vulnerabilities …

Cybersecurity

Estonia has frozen its popular e-residency ID cards because of a massive security flaw

• <b>Estonian citizens and overseas "e-residents" rely on digital ID cards for services like banking and online voting.</b>• <b><br>Security researchers revealed the possibility of identity theft due to a security bug in September.</b>• <b><br>Estonia has frozen the cards until their owners update to a new security certificate.</b>• <b><br>A</b> …

Identity Theft

Experts warn about security after Donald Trump's Twitter account briefly deleted

The deactivation of @realDonaldTrump – apparently by a rogue employee – prompted much online mirth but raised concern about more sinister possibilities<p>For 11 hushed minutes, much of the world got to read the words they had waited to see since last November: “@realDonaldTrump does not exist”.<p>It …

Security

How to Securely Manage Passwords for Multiple Logins

The average person has 27 discreet online logins, and most of us reuse the same password over and over which can jeopardizing security.<p>In order to …

Cybersecurity

Lack of Trust in IoT Security Shows More Regulation Is Coming

Wherever you turn in the consumer, business, technology or government worlds, the Internet of things (IoT) is the hottest of all topics.Whether the …

Internet of Things

Hacking a Fingerprint Biometric

Embedded in this story about infidelity and a mid-flight altercation, there's an interesting security tidbit:<p>The woman had unlocked her husband's …

Privacy

Comment on US government wants “keys under doormat” approach to encryption by Anonymous

I think you’ll find that Telegram is used by a lot of Linux users – most of which will probably be arguing about which desktop environment is best. …

Encryption

Friday Squid Blogging: Peru and Chile Address Squid Overfishing

Peru and Chile have a new plan.<p>As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.<p>Read …

Privacy

Me on the Equifax Breach

<b>Testimony and Statement for the Record of Bruce Schneier<br>Fellow and Lecturer, Belfer Center for Science and International Affairs, Harvard Kennedy</b> …

Privacy

Amazon Creates Classified US Cloud

Amazon has a cloud for U.S. classified data.<p>The physical and computer requirements for handling classified information are considerable, both in …

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement

The security researchers at Princeton are postingYou may know that most websites have third-party analytics scripts that record which pages you visit …

Medicine

Vulnerability in Amazon Key

Amazon Key is an IoT door lock that can enable one-time access codes for delivery people. To further secure that system, Amazon sells Cloud Cam, a …

Privacy

Facebook Fingerprinting Photos to Prevent Revenge Porn

This is a pilot project in Australia:<p>Individuals who have shared intimate, nude or sexual images with partners and are worried that the partner (or …

Privacy

BostInno Approved: November’s Top Tech & Startup Events in Boston

The excuse “there’s nothing to do in Boston” is hereby banned in November. The amount of tech and startup events happening in Boston is absolutely …

Boston

Fraud Detection in Pokémon Go

I play Pokémon Go. (There, I've admitted it.) One of the interesting aspects of the game I've been watching is how the game's publisher, Niantec, …

Pokémon

Motherboard Digital Security Guide

This digital security guide by Motherboard is very good. I put alongside EFF's "Surveillance Self-Defense" and John Scott-Railton's "Digital Security …

Privacy

Long Article on NSA and the Shadow Brokers

The <i>New York Times</i> just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational …

National Security Agency (NSA)

Heart Size: Yet Another Biometric

Turns out that heart size doesn't change throughout your adult life, and you can use low-level Doppler radar to scan the size -- even at a distance …

Vincent Van Gogh

New Fare System Raises Security Concerns, but Officials Promise Safety

The MetroCard has had its downsides — “Please swipe again’’ are three words that are the curse of just about every New York City subway rider. More significantly, the wallet-size card has become outdated in a high-tech world. But at least it was hard to hack.<p>Now the Metropolitan Transportation …

New York City