From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Children are being warned that the name of their first pet should contain at least eight characters and a digit.schneier From Schneier on Security | July 6, 2012 at 02:40 PM
I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...schneier From Schneier on Security | July 5, 2012 at 11:17 AM
It's designed to steal blueprints and send them to China.
Note that although this is circumstantial evidence that the virus is from China, it is possible that...schneier From Schneier on Security | July 3, 2012 at 11:22 AM
Last week I was at the Workshop on Economics and Information Security in Berlin. Excellent conference, as always. Ross Anderson liveblogged the event; see the...schneier From Schneier on Security | July 2, 2012 at 11:20 AM
A dead 13-foot-long giant squid has been found off the coast of New South Wales.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | June 29, 2012 at 09:14 PM
Abstract: The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough toScience...schneier From Schneier on Security | June 29, 2012 at 11:35 AM
Interesting review -- by David Roepik -- of The Rise of Nuclear Fear, by Spencer Weart:
Along with contributing to the birth of the environmental movement, Weart...schneier From Schneier on Security | June 28, 2012 at 01:50 PM
I'm reading Top Secret America: The Rise of the New American Security State, by Dana Priest and William M. Arkin. Both work for The Washington Post. The book...schneier From Schneier on Security | June 27, 2012 at 11:35 AM
If the safe doesn't open, use a sledgehammer:
The sledgehammer's existence first came to light in 1980, when a group of inspecting officers from the General Staff...schneier From Schneier on Security | June 27, 2012 at 11:30 AM
This informal survey produced the following result: "45% of the users found their email accounts more valuable than their bank accounts."
The author believes this...schneier From Schneier on Security | June 26, 2012 at 06:57 PM
There was a conference on resilience (highlights here, and complete videos here) earlier this year. Here's an interview with professor Sander van der Leeuw on...schneier From Schneier on Security | June 25, 2012 at 04:17 PM
I think this is a parody, but you can never be sure.
Millions of Britons turned out for the Queenschneier From Schneier on Security | June 22, 2012 at 09:03 PM
Yes, it's clever:
The basic problem is the average haul from a bank job: for the three-year period, it was only schneier From Schneier on Security | June 22, 2012 at 12:20 PM
Interesting conclusion by Cormac Herley, in this paper: "Why Do Nigerian Scammers Say They are From Nigeria?"
Abstract: False positives cause many promising detection...schneier From Schneier on Security | June 21, 2012 at 06:03 PM
It's not a new idea, but Apple Computer has received a patent on "Techniques to pollute electronic profiling":
Abstract: Techniques to pollute electronic profiling...schneier From Schneier on Security | June 21, 2012 at 10:51 AM