From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I wrote about this technique in Beyond Fear:
Beginning Sunday evening, the robbers intentionally set off the gallery's alarm system several times without entering...schneier From Schneier on Security | January 19, 2012 at 12:36 PM
Thankfully, this doesn't happen very often:
A US man who had been convicted on a second-degree murder charge will get a new trial after a computer virus destroyed...schneier From Schneier on Security | January 17, 2012 at 01:31 PM
Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...schneier From Schneier on Security | January 17, 2012 at 09:31 AM
This is a first:
...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...schneier From Schneier on Security | January 16, 2012 at 03:58 PM
Yet another story that combines squid and security.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | January 13, 2012 at 10:19 PM
Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...schneier From Schneier on Security | January 13, 2012 at 06:58 PM
It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...schneier From Schneier on Security | January 13, 2012 at 12:58 PM
I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...schneier From Schneier on Security | January 12, 2012 at 09:04 PM
The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.schneier From Schneier on Security | January 12, 2012 at 08:39 PM
Very interesting:
The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...schneier From Schneier on Security | January 12, 2012 at 06:37 PM
Apple has a patent on splitting a key between a portable device and its power supply.
Clever idea.schneier From Schneier on Security | January 12, 2012 at 11:53 AM
John Mueller has been collecting them:
Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...schneier From Schneier on Security | January 10, 2012 at 12:56 PM
Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...schneier From Schneier on Security | January 9, 2012 at 06:55 PM
Have you wondered what $1.2 billion in airport security gets you? The TSA has compiled its own "Top 10 Good Catches of 2011":
10) Snakes, turtles, and birds were...schneier From Schneier on Security | January 9, 2012 at 12:00 PM
It's a serious vulnerability. Note that this is the research that was mistakenly reported as allowing hackers to set your printer on fire.
Here's a list of all...schneier From Schneier on Security | January 6, 2012 at 07:50 PM
The author of this article notices that it's often easy to guess a cell phone PIN because of smudge marks on the screen. Those smudge marks indicate the four PIN...schneier From Schneier on Security | January 6, 2012 at 12:30 PM