From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting:
The researchers interviewed 52 convicted murderers, 14 of them ranked as psychopaths according to the Psychopathy Checklist-Revised, a 20-item assessment...schneier From Schneier on Security | November 17, 2011 at 12:37 PM
Really nice article on crypotographer Paul Kocher and his company, Cryptography Research, Inc. schneier From Schneier on Security | November 16, 2011 at 10:45 PM
I thought this was very interesting. His three principles are:
Avoid dangerous people and dangerous places.
Do not defend your property.
Respond immediately and...schneier From Schneier on Security | November 16, 2011 at 03:17 PM
There's a group who charges to make social engineering calls to obtain missing personal information for identity theft.
This doesn't surprise me at all. Fraud...schneier From Schneier on Security | November 15, 2011 at 11:26 AM
From Mikko Hypponen: "We found a malware sample. Which was signed. With a valid certificate. Belonging to the Government of Malaysia."schneier From Schneier on Security | November 14, 2011 at 08:02 PM
This seems like a bad vulnerability:
Researchers have demonstrated a vulnerability in the computer systems used to control facilities at federal prisons that could...schneier From Schneier on Security | November 14, 2011 at 01:14 PM
It's taken me a few years, but I've come around to this buzzword. It highlights an important characteristic of a particular sort of Internet attacker.
A conventional...schneier From Schneier on Security | November 9, 2011 at 07:51 PM
It's a crime with finesse:
But he is actually a middle-aged or older man who has been doing this for a very long time. And he is a fading breed.
"It's like a...schneier From Schneier on Security | November 7, 2011 at 06:43 PM
This sort of thing seems like a decent approach, but it has a lot of practical problems:
In the wake of Wikileaks, the Department of Defense has stepped up its...schneier From Schneier on Security | November 7, 2011 at 12:26 PM
Someone edited Star Trek IV, removing the whales and replacing them with giant squid.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | November 4, 2011 at 09:47 PM
From the Journal of Strategic Studies: "Cyber War Will Not Take Place" (full article is behind a paywall):
Abstract: For almost two decades, experts and defense...schneier From Schneier on Security | November 3, 2011 at 06:22 PM
Interesting research on how parents help their children lie about their age to get onto Facebook.
One reaction to our data might be that companies should not be...schneier From Schneier on Security | November 3, 2011 at 12:03 PM
I note that the three "industry leaders" speaking at the DARPA Cyber Colloquium next week have about 75 years of government experience between them.schneier From Schneier on Security | November 1, 2011 at 06:41 PM
I was not surprised that police forces are buying this system, but at its capabilities.
Britain's largest police force is operating covert surveillance technology...schneier From Schneier on Security | October 31, 2011 at 05:29 PM
This brazen tactic is from Malaysia. Robbers sabotage the machines, and then report the damage to the bank. When the banks send repair technicians to open and...schneier From Schneier on Security | October 31, 2011 at 01:18 PM
It's hard to tell if he likes it.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 28, 2011 at 09:25 PM