From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Total cost for the Yemeni printer cartridge bomb plot: $4200.
"Two Nokia mobiles, $150 each, two HP printers, $300 each, plus shipping, transportation and other...schneier From Schneier on Security | November 29, 2010 at 12:52 PM
At Woods Hole:
It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...schneier From Schneier on Security | November 26, 2010 at 10:58 PM
I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...schneier From Schneier on Security | November 26, 2010 at 07:52 PM
Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.
schneier From Schneier on Security | November 26, 2010 at 11:51 AM
Good. It was always a dumb idea:
The color-coded threat levels were doomed to fail because "they donschneier From Schneier on Security | November 25, 2010 at 12:39 PM
In Europe, although the article doesn't say where:
Many banks have fitted ATMs with devices that are designed to thwart criminals from attaching skimmers to the...schneier From Schneier on Security | November 24, 2010 at 07:33 PM
Yesterday I participated in a New York Times "Room for Debate" discussion on airline security. My contribution is nothing I haven't said before, so I won't reprint...schneier From Schneier on Security | November 23, 2010 at 12:11 PM
Rare common sense:
But Gen Richards told the BBC it was not possible to defeat the Taliban or al-Qaeda militarily.
"You can't. We've all said this. David Petraeus...schneier From Schneier on Security | November 22, 2010 at 07:08 PM
Another piece of the puzzle:
New research, published late last week, has established that Stuxnet searches for frequency converter drives made by Fararo Paya of...schneier From Schneier on Security | November 22, 2010 at 12:19 PM
Last week, I gave a talk on cyberwar and cyberconflict at the Institute for International and European Affairs in Dublin. Here's the video.
It was only the second...schneier From Schneier on Security | November 19, 2010 at 07:13 PM
Things are happening so fast that I don't know if I should bother. But here are some links and observations.
The head of the Allied Pilots Association is telling...schneier From Schneier on Security | November 19, 2010 at 11:37 AM
Excellent:
Here's a scenario:
Middle Eastern terrorists hijack a U.S. jetliner bound for Italy. A two-week drama ensues in which the plane's occupants are split...schneier From Schneier on Security | November 18, 2010 at 06:19 PM
Adding them all up, the U.S. government "receives between 8,000 and 10,000 pieces of information per day, fingering just as many different people as potential threats...schneier From Schneier on Security | November 18, 2010 at 12:13 PM
Eye movements instead of eye structures.
The new system tracks the way a person's eye moves as he watches an icon roam around a computer screen. The way the icon...schneier From Schneier on Security | November 17, 2010 at 01:13 PM
This recent essay (commentary here) reminded me of this older essay, both by people who write student term papers for hire.
There are several services that dopersonal...schneier From Schneier on Security | November 16, 2010 at 12:36 PM
Last month, Scott Charney of Microsoft proposed that infected computers be quarantined from the Internet. Using a public health model for Internet security, the...schneier From Schneier on Security | November 15, 2010 at 09:58 AM