Leaking Screen Information on Zoom Calls through Reflections in Eyeglasses

Okay, it’s an obscure threat. But people are researching it:
Our models and experimental results in a controlled lab setting show it is possibl... schneier.com/blog/archives/202

-channelattacks

Automatic Cheating Detection in Human Racing

This is a fascinating glimpse of the future of automatic cheating detection in sports:
Maybe you heard about the truly insane false-start controversy in track and field... schneier.com/blog/archives/202

Credit Card Fraud That Bypasses 2FA

Someone in the UK is stealing smartphones and credit cards from people who have stored them in gym lockers, and is using the two items in combination to commit fraud:
<blockquot... schneier.com/blog/archives/202

-factorauthentication

Large-Scale Collection of Cell Phone Data at US Borders

The Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and comput... schneier.com/blog/archives/202

Friday Squid Blogging: Mayfly Squid

This is surprisingly funny.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines... schneier.com/blog/archives/202

Massive Data Breach at Uber

It’s big:
The breach appeared to have compromised many of Uber’s internal systems, and a person claiming responsibility for the hac... schneier.com/blog/archives/202

Relay Attack against Teslas

Nice work:
Radio relay attacks are technically complicated to execute, but conceptually easy to understand: attackers simply e... schneier.com/blog/archives/202

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak:

I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Se... schneier.com/blog/archives/202

Weird Fallout from Peiter Zatko’s Twitter Whistleblowing

People are trying to dig up dirt on Peiter Zatko, better known as Mudge.
For the record, I have not been contacted. I’m not sure ... schneier.com/blog/archives/202

FBI Seizes Stolen Cryptocurrencies

The Wall Street Journal is reporting that the FBI has recovered over $30 million in cryptocurrency stolen b... schneier.com/blog/archives/202

Friday Squid Blogging: Colossal Squid in New Zealand Museum

It’s in Timaru.
As usual, you can also use this squid post to talk about the security stories in the news that I haven... schneier.com/blog/archives/202

Responsible Disclosure for Cryptocurrency Security

Stewart Baker discusses why the industry-norm responsible disclosure for software vulnerabilities fails for cryptocurrency software.
<blockquot... schneier.com/blog/archives/202

Facebook Has No Idea What Data It Has

This is from a court deposition:
Facebook’s stonewalling has been revealing on its own, providing variations on the same theme: It... schneier.com/blog/archives/202

Friday Squid Blogging: Squid Images

iStock has over 13,000 royalty-free images of squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
<... schneier.com/blog/archives/202

Montenegro is the Victim of a Cyberattack

Details are few, but Montenegro has suffered a cyberattack:
A combination of ransomware and distributed denia... schneier.com/blog/archives/202

Show older
burn.capital mastodon

Toots for friends