Schneier on Security

Schneier on Security A blog covering security and security technology.

  • Secret Service Tracking People’s Locations without Warrant
    by Bruce Schneier on November 21, 2024 at 12:03 pm

    This feels important: The Secret Service has used a technology called Locate X which uses location data harvested from ordinary apps installed on phones. Because users agreed to an opaque terms of service page, the Secret Service believes it doesn’t need a warrant.

  • Steve Bellovin’s Retirement Talk
    by Bruce Schneier on November 20, 2024 at 4:22 pm

    Steve Bellovin is retiring. Here’s his retirement talk, reflecting on his career and what the cybersecurity field needs next.

  • Why Italy Sells So Much Spyware
    by Bruce Schneier on November 19, 2024 at 12:05 pm

    Interesting analysis: Although much attention is given to sophisticated, zero-click spyware developed by companies like Israel’s NSO Group, the Italian spyware marketplace has been able to operate relatively under the radar by specializing in cheaper tools. According to an Italian Ministry of Justice document, as of December 2022 law enforcement in the country could rent spyware for €150 a day, regardless of which vendor they used, and without the large acquisition costs which would normally be prohibitive. As a result, thousands of spyware operations have been carried out by Italian authorities in recent years, according to a …

  • Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days
    by Bruce Schneier on November 18, 2024 at 3:49 pm

    Zero-day vulnerabilities are more commonly used, according to the Five Eyes: Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were exploited as a zero-day. Malicious cyber actors continue to have the most success exploiting vulnerabilities within two years after public disclosure of the vulnerability. The utility of these vulnerabilities declines over time as more systems are patched or replaced. Malicious cyber actors find less utility from zero-day exploits when international cybersecurity efforts reduce the lifespan of zero-day vulnerabilities…

  • Friday Squid Blogging: Female Gonatus Onyx Squid Carrying Her Eggs
    by Bruce Schneier on November 15, 2024 at 10:07 pm

    Fantastic video of a female Gonatus onyx squid swimming while carrying her egg sack. An earlier related post. Blog moderation policy.

  • Good Essay on the History of Bad Password Policies
    by Bruce Schneier on November 15, 2024 at 12:05 pm

    Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but that had not been studied scientifically. Their work was a big step forward, if not for two mistakes that would impede future progress in improving passwords for decades. First, was Morris and Thompson’s confidence that their solution, a password policy, would fix the underlying problem of weak passwords. They incorrectly assumed that if they prevented the specific categories of weakness that they had noted, that the result would be something strong. After implementing a requirement that password have multiple characters sets or more total characters, they wrote:…

  • New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones
    by Bruce Schneier on November 14, 2024 at 12:05 pm

    Everybody is reporting about a new security iPhone security feature with iOS 18: if the phone hasn’t been used for a few days, it automatically goes into its “Before First Unlock” state and has to be rebooted. This is a really good security feature. But various police departments don’t like it, because it makes it harder for them to unlock suspects’ phones.

  • Mapping License Plate Scanners in the US
    by Bruce Schneier on November 13, 2024 at 12:06 pm

    DeFlock is a crowd-sourced project to map license plate scanners. It only records the fixed scanners, of course. The mobile scanners on cars are not mapped.

  • Criminals Exploiting FBI Emergency Data Requests
    by Bruce Schneier on November 12, 2024 at 12:05 pm

    I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same thing is true for non-technical backdoors: The advisory said that the cybercriminals were successful in masquerading as law enforcement by using compromised police accounts to send emails to companies requesting user data. In some cases, the requests cited false threats, like claims of human trafficking and, in one case, that an individual would “suffer greatly or die” unless the company in question returns the requested information…

  • Friday Squid Blogging: Squid-A-Rama in Des Moines
    by Bruce Schneier on November 8, 2024 at 10:04 pm

    Squid-A-Rama will be in Des Moines at the end of the month. Visitors will be able to dissect squid, explore fascinating facts about the species, and witness a live squid release conducted by local divers. How are they doing a live squid release? Simple: this is Des Moines, Washington; not Des Moines, Iowa. Blog moderation policy.

Share Websitecyber