From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Spyware on many smart phones monitors your every action, including collecting individual keystrokes. The company that makes and runs this software on behalf of...schneier From Schneier on Security | December 5, 2011 at 12:05 PM
Last weekend, I received an honorary PhD from the University of Westminster, in London.
I have had mixed feelings about this since I was asked early this year....schneier From Schneier on Security | December 2, 2011 at 07:57 PM
It's the kind of research result that screams hype, but online attacks that have physical-world consequences are fundamentally a different sort of threat. I suspect...schneier From Schneier on Security | December 2, 2011 at 07:17 PM
Interesting essay on walls and their effects:
Walls, then, are built not for security, but for a sense of security. The distinction is important, as those whoas...schneier From Schneier on Security | December 2, 2011 at 11:30 AM
According to researchers, full-disk encryption is hampering police forensics.
The authors of the report suggest there are some things law enforcement can do, but...schneier From Schneier on Security | December 1, 2011 at 07:44 PM
After a long and hard year, Liars and Outliers is done. I submitted the manuscript to the publisher on Oct 1, got edits back from both an outside editor and a...schneier From Schneier on Security | December 1, 2011 at 12:25 PM
The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology:
The virus...schneier From Schneier on Security | November 30, 2011 at 06:28 PM
I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied:
But others inside the American intelligence...schneier From Schneier on Security | November 30, 2011 at 12:57 PM
If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world:
Maize plants, like many others, protect themselves...schneier From Schneier on Security | November 29, 2011 at 08:13 PM
Electronic surveillance is becoming so easy that even marketers can do it:
The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd...schneier From Schneier on Security | November 29, 2011 at 01:01 PM
Shichang Zhang, Teck Hui Koh, Wee Khee Seah, Yee Hing Lai, Mark A. Elgar, and Daiqin Li (2011), "A Novel Property of Spider Silk: Chemical Defence Against Ants,"...schneier From Schneier on Security | November 28, 2011 at 06:55 PM
There was an interdisciplinary cephalopod art conference earlier this year, in Minneapolis. Videos of the conference are available online.
As usual, you can also...schneier From Schneier on Security | November 25, 2011 at 10:27 PM
The Android platform is where the malware action is:
What happens when anyone can develop and publish an application to the Android Market? A 472% increase ingain...schneier From Schneier on Security | November 25, 2011 at 12:06 PM
Dan Boheh of Stanford University is teaching a free cryptography class starting in January.schneier From Schneier on Security | November 22, 2011 at 11:59 AM
A hack against a SCADA system controlling a water pump in Illinois destroyed the pump.
We know absolutely nothing here about the attack or the attacker's motivations...schneier From Schneier on Security | November 21, 2011 at 12:57 PM
Some squid can switch their camouflage instantly.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | November 18, 2011 at 10:41 PM
I write a lot about altruism, fairness, and cooperation in my new book (out in February!), and this sort of thing interests me a lot:
In a new study, researchers...schneier From Schneier on Security | November 18, 2011 at 11:50 AM
The European Union has banned X-ray full body scanners at airports. Millimeter wave scanners are allowed as long as they conform to privacy guidelines.
UnderArticle...schneier From Schneier on Security | November 17, 2011 at 07:13 PM