From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...schneier From Schneier on Security | May 27, 2011 at 11:04 AM
It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...schneier From Schneier on Security | May 26, 2011 at 06:57 PM
It's now available as a free download:
A free version of the Blackhole exploit kit has appeared online in a development that radically reduces the entry-level...schneier From Schneier on Security | May 25, 2011 at 03:28 PM
SCADA systems -- computer systems that control industrial processes -- are one of the ways a computer hack can directly affect the real world. Here, the fearssuccessfully...schneier From Schneier on Security | May 24, 2011 at 10:50 AM
I haven't written about Dropbox's security problems; too busy with the book. But here's an excellent summary article from The Economist.
The meta-issue is pretty...schneier From Schneier on Security | May 23, 2011 at 11:47 AM
The Centers for Disease Control and Prevention weigh in on preparations for the zombie apocalypse.
schneier From Schneier on Security | May 20, 2011 at 09:00 PM
TSA-style security is now so normal that it's part of a Disney ride:
The second room of the queue is now a security check area, similar to a TSA checkpoint. The...schneier From Schneier on Security | May 20, 2011 at 07:43 PM
For years, an employee of Cubic Corp -- the company who makes the automatic fair card systems for most of the subway systems around the world -- forged forged and...schneier From Schneier on Security | May 20, 2011 at 12:44 PM
From the Associated Ptress:
Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the U.S....schneier From Schneier on Security | May 18, 2011 at 01:45 PM
Scanning fingerprints from six feet away.
Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light....schneier From Schneier on Security | May 17, 2011 at 12:46 PM
This FBI surveillance device, designed to be attached to a car, has been taken apart and analyzed.
A recent ruling by the 9th U.S. Circuit Court of Appeals affirms...schneier From Schneier on Security | May 16, 2011 at 11:31 AM
These are what I get for giving interviews when I'm in a bad mood. For the record, I think Sony did a terrible job with its customers' security. I also think...schneier From Schneier on Security | May 13, 2011 at 04:29 PM
This is a pretty scary criminal tactic from Turkey. Burglars dress up as doctors, and ring doorbells handing out pills under some pretense or another. They're...schneier From Schneier on Security | May 13, 2011 at 12:11 PM