From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In 2008 I wrote about the security mindset and how difficult it is to teach. Two professors teaching a cyberwarfare class gave an exam where they expected their...schneier From Schneier on Security | June 13, 2012 at 05:08 PM
USA Today article:
Most troubling to authorities is the sophistication of the forgeries: Digital holograms are replicated, PVC plastic identical to that found...schneier From Schneier on Security | June 13, 2012 at 11:45 AM
There have been a bunch of stories about employers demanding passwords to social networking sites, like Facebook, from prospective employees, and several states...schneier From Schneier on Security | June 12, 2012 at 10:09 AM
New paper by Peter P. Swire -- "From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud":
Abstract: This...schneier From Schneier on Security | June 11, 2012 at 11:36 AM
Baby squid larvae are transparent after they hatch, so you can see the chromataphores (color control mechanisms) developing after a few days.
As usual, you can...schneier From Schneier on Security | June 8, 2012 at 09:28 PM
This is an interesting essay -- it claims to be the first in a series -- that looks at the rise of "homeland security" as a catastrophic consequence of the 9/11...schneier From Schneier on Security | June 8, 2012 at 11:43 AM
Look at the last sentence in this article on hotel cleanliness:
"I relate this to homeland security. We are not any safer, but many people believe that we are,"...schneier From Schneier on Security | June 7, 2012 at 11:15 AM
Ghostery is a Firefox plug-in that tracks who is tracking your browsing habits in cyberspace. Here's a TED talk by Gary Kovacs, the CEO of Mozilla Corp., on it...schneier From Schneier on Security | June 6, 2012 at 02:36 PM
I'm at the Fifth Interdisciplinary Workshop on Security and Human Behavior, SHB 2012. Google is hosting this year, at its offices in lower Manhattan.
SHB is an...schneier From Schneier on Security | June 5, 2012 at 06:16 PM
This is worth reading, for the insights it provides on how a country goes about monitoring its citizens in the information age: a combination of targeted attacks...schneier From Schneier on Security | June 5, 2012 at 11:07 AM
Interesting article:
The reliability of witness testimony is a vastly complex subject, but legal scholars and forensic psychologists say it's possible to extract...schneier From Schneier on Security | June 4, 2012 at 11:36 AM
Flame seems to be another military-grade cyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers...schneier From Schneier on Security | June 4, 2012 at 11:21 AM
Interesting:
Cephalopods - squid, cuttlefish and octopuses - change colour by using tiny muscles in their skins to stretch out small sacs of black colouration....schneier From Schneier on Security | June 1, 2012 at 09:40 PM
Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...schneier From Schneier on Security | June 1, 2012 at 11:48 AM
I wrote about this sort of thing in 2006 in the UK, but it's even bigger business here:
The criminals, some of them former drug dealers, outwit the Internal Revenue...schneier From Schneier on Security | May 31, 2012 at 06:19 PM
A particularly clever form of retail theft -- especially when salesclerks are working fast and don't know the products -- is to switch bar codes. This particular...schneier From Schneier on Security | May 31, 2012 at 11:17 AM
When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much...schneier From Schneier on Security | May 30, 2012 at 05:54 PM
The context is tornado warnings:
The basic problem, Smith says, it that sirens are sounded too often in most places. Sometimes they sound in an entire county for...schneier From Schneier on Security | May 30, 2012 at 11:44 AM
We all knew this was possible, but researchers have found the exploit in the wild:
Claims were made by the intelligence agencies around the world, from MI5, NSA...schneier From Schneier on Security | May 29, 2012 at 12:28 PM