From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It turns out to be surprisingingly easy:
The owner, who posted the video at 1addicts.com, suspects the thieves broke the glass to access the BMW's on-board diagnostics...schneier From Schneier on Security | July 13, 2012 at 11:51 AM
This paper looks at access control for mobile phones. Basically, it's all or nothing: either you have a password that protects everything, or you have no password...schneier From Schneier on Security | July 12, 2012 at 05:59 PM
For years, it's been a clever trick to drop USB sticks in parking lots of unsuspecting businesses, and track how many people plug them into computers. I have long...schneier From Schneier on Security | July 12, 2012 at 02:47 PM
This is important:
In July 2011, a federal appeals court ruled that the Transportation Security Administration had to conduct a notice-and-comment rulemaking on...schneier From Schneier on Security | July 11, 2012 at 05:39 PM
William Gibson's Grippa Code is available for cryptanalysis. Break the code, win a prize.schneier From Schneier on Security | July 11, 2012 at 12:49 PM
From an article on the cocaine trade between Mexico and the U.S.:
"They erect this fence," he said, "only to go out there a few days later and discover that these...schneier From Schneier on Security | July 10, 2012 at 09:33 AM
Two, at least:
"Bee stings killed as many in UK as terrorists, says watchdog."
"Americans Are as Likely to Be Killed by Their Own Furniture as by Terrorism."
Is...schneier From Schneier on Security | July 9, 2012 at 05:36 PM
A team at the University of Texas successfully spoofed the GPS and took control of a DHS drone, for about $1,000 in off-the-shelf parts. Does anyone think that...schneier From Schneier on Security | July 9, 2012 at 11:02 AM
This was suprisingly interesting.
When a body is mysterious, you cut it open. You peel back the skin and take stock of its guts. It is the science of an arrow,...schneier From Schneier on Security | July 6, 2012 at 09:58 PM
Children are being warned that the name of their first pet should contain at least eight characters and a digit.schneier From Schneier on Security | July 6, 2012 at 02:40 PM
I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...schneier From Schneier on Security | July 5, 2012 at 11:17 AM
It's designed to steal blueprints and send them to China.
Note that although this is circumstantial evidence that the virus is from China, it is possible that...schneier From Schneier on Security | July 3, 2012 at 11:22 AM
Last week I was at the Workshop on Economics and Information Security in Berlin. Excellent conference, as always. Ross Anderson liveblogged the event; see the...schneier From Schneier on Security | July 2, 2012 at 11:20 AM
A dead 13-foot-long giant squid has been found off the coast of New South Wales.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | June 29, 2012 at 09:14 PM
Abstract: The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough toScience...schneier From Schneier on Security | June 29, 2012 at 11:35 AM
Interesting review -- by David Roepik -- of The Rise of Nuclear Fear, by Spencer Weart:
Along with contributing to the birth of the environmental movement, Weart...schneier From Schneier on Security | June 28, 2012 at 01:50 PM
I'm reading Top Secret America: The Rise of the New American Security State, by Dana Priest and William M. Arkin. Both work for The Washington Post. The book...schneier From Schneier on Security | June 27, 2012 at 11:35 AM