Category : Schneier on Security

Security / Schneier on Security - 1 day ago

SIM Hijacking

SIM Hijacking SIM hijacking -- or SIM swapping -- is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they control. Since your smartphone often serves as...

Security / Schneier on Security - 1 week ago

5G Security

5G Security The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Because the companies that make the equipment are subservient to the Chinese government, they could be forced to include...

Security / Schneier on Security - 2 weeks ago

New SHA-1 Attack

New SHA-1 Attack There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation att...

Security / Schneier on Security - 2 weeks ago

USB Cable Kill Switch for Laptops

BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop on one end, and to your belt, on the other end. When someone...

Security / Schneier on Security - 2 weeks ago

Mailbox Master Keys

Mailbox Master Keys Here's a physical-world example of why master keys are a bad idea. It's a video of two postal thieves using a master key to open apartment building mailboxes. Changing the master key for physical mailbox...