Bruce Schneier

Type: Person
Name: Bruce Schneier
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

The Bash Bug Could be a “Joe Biden-sized” Problem – Part 1

0 RecommendedRecommend Share on Facebook 1 1 SHARES Unless you’re a real-life version of Sheldon Cooper, a computer security professional, or, like me, work in the online payment industry, you probably don’t keep up with the latest computer vulnerabilities. ... [Published Redstate - Sep 26 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Bash Bug Could "Shellshock" IT Systems And Be Worse Than Heartbleed

John Hopton for redOrbit.com – Your Universe OnlineComputer security experts are warning of a vulnerability that could be even more serious than “ Heartbleed ,” the havoc-wreaking bug that emerged in April 2014. It concerns Unix and Linux devices, as ... [Published Red Orbit - Sep 26 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Time to buy wow gold/gears/mounts/pets with 8% coupon code SEP8OFF for wow 6.0 coming

wow itemsBorrow it back.Your giftee trusts you to find the best possible presentto wrap, so why not find "Liars and Outliers" by Bruce Schneier? Thisis a book about trust, society, and how they work in tandem. It's theperfect gift for a deep thinker or ... [Published Student Village - Sep 26 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

Trust Me

Want to see civic connection in action? Go to the dog park.Photo by Lucas Jackson/ReutersWhen I told people I was working on a book about our faith in others , they sometimes seemed to think I was an aspiring self-help guru. Strangers would confess to ... [Published Slate Magazine - Sep 25 2014]
First reported Sep 24 2014 - Updated Sep 24 2014 - 1 reports

A Look Back at ‘the State of Incident Response’ by Bruce Schneier

The State of Incident Response: Black Hat USA 2014 Keynote Recap from Bruce Schneier In my continuing series of keynote recaps , I will be covering Bruce Schneier’s keynote at Black Hat USA 2014 — yes, it can be called a keynote even though it is more ... [Published Security Intelligence - Sep 24 2014]
First reported Sep 22 2014 - Updated Sep 23 2014 - 1 reports

Are Google and Apple On Your Side?

In the past couple of days both Google 1 and Apple 2 have announced that they’re enabling default encryption on their mobile devices so that only the user possessing a device’s password can access its local files. The public relations team at Apple makes ... [Published Dissident Voice - Sep 22 2014]
First reported Sep 20 2014 - Updated Sep 20 2014 - 1 reports

The security guy who’s unlocking the mystery of government surveillance

Renowned security expert Bruce Schneier is on the phone from a US airport, and there’s an awful lot of commotion going on in the background.A bleeping siren is punctuated by loud announcements. “I have no idea what is going on,” says Schneier. “Oh, wait. ... [Published Irish Times - Sep 20 2014]
First reported Sep 19 2014 - Updated Sep 19 2014 - 1 reports

Internationally Renowned Security Expert Bruce Schneier to Keynote the 2015 ISSA-LA Information Security Summit on Cybercrime Solutions

Internationally Renowned Security Expert Bruce Schneier to Keynote the 2015 ISSA-LA Information Security Summit on Cybercrime Solutions ... [Published Security Bloggers Network - Sep 19 2014]
First reported Sep 16 2014 - Updated Sep 16 2014 - 1 reports

Co3 Systems CTO Bruce Schneier to Keynote IAPP Privacy Academy; CSA Congress 2014

Schneier to Discuss the Future of Incident Response ... [Published Marketwire - Breaking News Releases - Sep 16 2014]
First reported Sep 12 2014 - Updated Sep 12 2014 - 1 reports

Internationally Renowned Security Expert Bruce Schneier to Keynote the 2015 ISSA-LA Information Security Summit on Cybercrime Solutions

Bruce Schneier, one of the world’s leading experts on computer security and privacy issues, will deliver the keynote address at the Los Angeles Chapter of the Information Systems Security Association (ISSA-LA) Seventh Annual Information Security Summit ... [Published Security Bloggers Network - Sep 12 2014]
First reported Sep 08 2014 - Updated Sep 08 2014 - 1 reports

ArchC0n ’14 Report

I spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason I chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the ... [Published Digital Bond's SCADA Security Portal - Sep 08 2014]
First reported Sep 03 2014 - Updated Sep 03 2014 - 1 reports

Apple Hack Points to Broader Vulnerabilities in the Cloud

. Robert Galbraith/ReutersApple has issued a statement denying that a recent hack of celebrity iCloud accounts was the result of an internal security flaw. "None of the cases we have investigated has resulted from any breach in any of Apple's systems ... [Published MSNBC Newsweek - Sep 03 2014]

Quotes

Individuals: Amazon has become notorious for remotely deleting books purchased by Kindle owners. Security expert Bruce Schneier commented, "it illustrates how few rights you have when you buy an e-book from amazon. as a kindle owner, i'm frustrated. i can't lend people books and i can't sell books that i've already read, and now it turns out that i can't even count on still having my books tomorrow."

More Content

All (370) | News (240) | Reports (0) | Blogs (130) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
On privacy, "conflicting feelings" of the Inter... [Published DSL Prime - 11 hours ago]
Google privacy row: what does Google know about... [Published The First Post: Latest - Sep 29 2014]
SHA-1 has been deprecated, what can I do? [Published Security Affairs - Sep 29 2014]
Airport Cameras Get Even More Orwellian: 'Abnor... [Published AlterNet.org - Sep 27 2014]
The Bash Bug Could be a “Joe Biden-sized” Probl... [Published Redstate - Sep 26 2014]
Ello Says You're Not a Product, But You Are [Published Yahoo! Finance - Sep 26 2014]
Bash Bug Could "Shellshock" IT Systems And Be W... [Published Red Orbit - Sep 26 2014]
Time to buy wow gold/gears/mounts/pets with 8% ... [Published Student Village - Sep 26 2014]
Trust Me [Published Slate Magazine - Sep 25 2014]
Entered the House, YODA has [Published The Hill - Sep 25 2014]
​'Bigger than Heartbleed': Bash bug could leave... [Published CNET News - Sep 25 2014]
What Is “Geek Culture”? [Published Slate Magazine - Sep 24 2014]
A Look Back at ‘the State of Incident Response’... [Published Security Intelligence - Sep 24 2014]
Juha Saarinen: The runaway surveillance machine [Published New Zealand Herald - Sep 24 2014]
Breaking up the NSA [Published ABC Online - Sep 23 2014]
A Deep Web Service Will Leak Your Documents If ... [Published Motherboard Magazine - Sep 22 2014]
Are Google and Apple On Your Side? [Published Dissident Voice - Sep 22 2014]
Cloud Security Alliance Announces Keynote Line ... [Published CRM Developer's Journal - Sep 22 2014]
Core Infrastructure Initiative Adds New Members... [Published CRM Developer's Journal - Sep 20 2014]
The security guy who’s unlocking the mystery of... [Published Irish Times - Sep 20 2014]
Cloudflare launches open source keyless SSL [Published IT News Australia - Sep 19 2014]
Internationally Renowned Security Expert Bruce ... [Published Security Bloggers Network - Sep 19 2014]
Security Company FireEye Pitches Extra Set Of E... [Published IT Business Net - Sep 18 2014]
Cameras to Detect ‘Abnormal’ Behavior [Published Consortium News - Sep 18 2014]
Surveillance – How to secretly track cellphone ... [Published Security Affairs - Sep 18 2014]
What's Homomorphic Encryption And Why Did It Ju... [Published Fast Company - Sep 18 2014]
security vulnerability [Published LWN - Sep 17 2014]
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
Co3 Systems CTO Bruce Schneier to Keynote IAPP ... [Published Marketwire - Breaking News Releases - Sep 16 2014]
Snowden Leaks Didn't Make Al Qaeda Change Tacti... [Published NBCNews.com - Sep 16 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
SHA-1 has been deprecated, what can I do? [Published Security Affairs - Sep 29 2014]
The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get cheaper soon. Many websites today are using digital certificates signed using algorithms based on the hash algorithm ...
A Look Back at ‘the State of Incident Response’... [Published Security Intelligence - Sep 24 2014]
The State of Incident Response: Black Hat USA 2014 Keynote Recap from Bruce Schneier In my continuing series of keynote recaps , I will be covering Bruce Schneier’s keynote at Black Hat USA 2014 — yes, it can be called a keynote even though it is more ...
Internationally Renowned Security Expert Bruce ... [Published Security Bloggers Network - Sep 19 2014]
Internationally Renowned Security Expert Bruce Schneier to Keynote the 2015 ISSA-LA Information Security Summit on Cybercrime Solutions ...
Surveillance – How to secretly track cellphone ... [Published Security Affairs - Sep 18 2014]
<img src="http://securityaffairs.co/wordpress/wp-content/plugins/facebook-button-plugin/images/standard-facebook-ico.png" alt="Fb-Button" title="SurveillanceHow to secretly track cellphone users position around the globe"/&gt; Using the proper surveillance ...
We Need More Than Penetration Testing [Published TaoSecurity - Sep 16 2014]
Last week I read an article titled   People too trusting when it comes to their cybersecurity, experts say  by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post: [Connor] Brewer is a 19-year-old sophomore at Butler ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.