From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The reports are still early, but it seems that a bunch of terrorist planning documents were found embedded in a digital file of a porn movie.
Several weeks later...schneier From Schneier on Security | May 2, 2012 at 05:41 PM
Two very interesting points in this essay on cybercrime. The first is that cybercrime isn't as big a problem as conventional wisdom makes it out to be.
We have...schneier From Schneier on Security | May 2, 2012 at 12:10 PM
I've long advocated investigation, intelligence, and emergency response as the places where we can most usefully spend our counterterrorism dollars. Here's anthat...schneier From Schneier on Security | May 1, 2012 at 12:31 PM
Army General Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, said:
A cyber attack could stop our society in its tracks.
Gadzooks. A scared populace...schneier From Schneier on Security | April 30, 2012 at 11:52 AM
Actionable Books is having a vote to determine which of four books to summarize on their site. If you are willing, please go there and vote for Liars and Outliers...schneier From Schneier on Security | April 28, 2012 at 12:57 AM
Great pictures.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 27, 2012 at 04:32 PM
At the RSA Conference this year, I noticed a trend of companies that have products and services designed to help victims recover from attacks. Kelly Jackson Higgins...schneier From Schneier on Security | April 27, 2012 at 11:53 AM
Last year, I wrote about how social media sites are making it harder than ever for undercover police officers. This story talks about how biometric passports are...schneier From Schneier on Security | April 26, 2012 at 11:57 AM
danah boyd is thinking about -- in a draft essay, and as a recording of a presentation -- fear and the attention economy. Basically, she is making the argument...schneier From Schneier on Security | April 25, 2012 at 11:51 AM
In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...schneier From Schneier on Security | April 24, 2012 at 04:44 PM
GCHQ, the UK government's communications headquarters, has released two new -- well, 70 years old, but new to us -- cryptanalysis documents by Alan Turing.
The...schneier From Schneier on Security | April 23, 2012 at 11:18 AM
How to extract squid ink.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 20, 2012 at 09:49 PM
Liars & Outliers has been available for about two months, and is selling well both in hardcover and e-book formats. More importantly, I'm very pleased with the...schneier From Schneier on Security | April 20, 2012 at 05:48 PM
Interesting data from the U.S. Government Accounting Office:
But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...schneier From Schneier on Security | April 20, 2012 at 11:19 AM
A burglar was identified by his dance moves, captured on security cameras:
"The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...schneier From Schneier on Security | April 19, 2012 at 06:03 PM
Brian Krebs writes about smart meter hacks:
But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...schneier From Schneier on Security | April 19, 2012 at 10:52 AM
Here's something good:
We have implemented sophisticated brute force protection for Linode Manager user accounts that combines a time delay on failed attempts,...schneier From Schneier on Security | April 18, 2012 at 06:30 PM
This article talks about a database of stolen cell phone IDs that will be used to deny service. While I think this is a good idea, I don't know how much it would...schneier From Schneier on Security | April 18, 2012 at 11:49 AM
That's a nice turn of phrase:
Forever day is a play on "zero day," a phrase used to classify vulnerabilities that come under attack before the responsible manufacturer...schneier From Schneier on Security | April 17, 2012 at 06:22 PM
From the CIA journal Studies in Intelligence: "Capturing the Potential of Outlier Ideas in the Intelligence Community."
In war you will generally find that the...schneier From Schneier on Security | April 17, 2012 at 11:15 AM