Tag: schneier

  • Schneier on Security: AI-Enabled Influence Operation Against Iran

    Source URL: https://www.schneier.com/blog/archives/2025/10/ai-enabled-influence-operation-against-iran.html Source: Schneier on Security Title: AI-Enabled Influence Operation Against Iran Feedly Summary: Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel. Key Findings A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer…

  • Schneier on Security: Daniel Miessler on the AI Attack/Defense Balance

    Source URL: https://www.schneier.com/blog/archives/2025/10/daniel-miessler-on-the-ai-attack-defense-balance.html Source: Schneier on Security Title: Daniel Miessler on the AI Attack/Defense Balance Feedly Summary: His conclusion: Context wins Basically whoever can see the most about the target, and can hold that picture in their mind the best, will be best at finding the vulnerabilities the fastest and taking advantage of them. Or,…

  • Schneier on Security: Use of Generative AI in Scams

    Source URL: https://www.schneier.com/blog/archives/2025/10/use-of-generative-ai-in-scams.html Source: Schneier on Security Title: Use of Generative AI in Scams Feedly Summary: New report: “Scam GPT: GenAI and the Automation of Fraud.” This primer maps what we currently know about generative AI’s role in scams, the communities most at risk, and the broader economic and cultural shifts that are making people…

  • Schneier on Security: Abusing Notion’s AI Agent for Data Theft

    Source URL: https://www.schneier.com/blog/archives/2025/09/abusing-notions-ai-agent-for-data-theft.html Source: Schneier on Security Title: Abusing Notion’s AI Agent for Data Theft Feedly Summary: Notion just released version 3.0, complete with AI agents. Because the system contains Simon Willson’s lethal trifecta, it’s vulnerable to data theft though prompt injection. First, the trifecta: The lethal trifecta of capabilities is: Access to your private…

  • Schneier on Security: Digital Threat Modeling Under Authoritarianism

    Source URL: https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html Source: Schneier on Security Title: Digital Threat Modeling Under Authoritarianism Feedly Summary: Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media…

  • Schneier on Security: Apple’s New Memory Integrity Enforcement

    Source URL: https://www.schneier.com/blog/archives/2025/09/apples-new-memory-integrity-enforcement.html Source: Schneier on Security Title: Apple’s New Memory Integrity Enforcement Feedly Summary: Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus tend to use to get unauthorized system access. From Wired: In recent years, a movement…

  • Schneier on Security: Time-of-Check Time-of-Use Attacks Against LLMs

    Source URL: https://www.schneier.com/blog/archives/2025/09/time-of-check-time-of-use-attacks-against-llms.html Source: Schneier on Security Title: Time-of-Check Time-of-Use Attacks Against LLMs Feedly Summary: This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.: Abstract: Large Language Model (LLM)-enabled agents are rapidly emerging across a wide range of applications, but their deployment introduces vulnerabilities with security implications.…