From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From 1871:
I hunted up statistics, and was amazed to find that after all the glaring newspaper headings concerning railroad disasters, less than three hundred...schneier From Schneier on Security | February 23, 2010 at 01:16 PM
There was a big U.S. cyberattack exercise this week. We didn't do a
This is, I think, an eyewitness report.
schneier From Schneier on Security | February 19, 2010 at 07:33 PM
It reads like a very professional operation:
Security footage of the killers' movements during the afternoon, released by police in Dubai yesterday, underlines...schneier From Schneier on Security | February 19, 2010 at 12:49 PM
Interesting blog post, with video demonstration, about an improved tool to open high security locks with a key that will just "form itself" if you insert it into...schneier From Schneier on Security | February 18, 2010 at 12:21 PM
I finally have control of my Facebook page. There'll be nothing on it that isn't on my blog, but some of you might prefer following my writing from there.
(ITwitter...schneier From Schneier on Security | February 17, 2010 at 08:38 PM
I had no idea this was being done, but erased answers are now analyzed on standardized tests. Schools with a high number of wrong-to-right changes across multiple...schneier From Schneier on Security | February 16, 2010 at 12:26 PM
I don't know which is more exciting: that someone is trying to break the squid record, or that there is a squid record in the first place.
An Auckland scientist...schneier From Schneier on Security | February 12, 2010 at 10:32 PM
This< is neat:
The Impressioner consists of a sensor that goes into the lock and sends information back to a computer via USB about the location of the lock's...schneier From Schneier on Security | February 12, 2010 at 12:23 PM
Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...schneier From Schneier on Security | February 11, 2010 at 10:18 PM
Really interesting reading.
Scam-Detective: How did you find victims for your scams?
John: First you need to understand how the gangs work. At the bottom are...schneier From Schneier on Security | February 11, 2010 at 01:19 PM
The iTunes Store Terms and Conditions prohibits it:
Notice, as I read this clause not only are terrorists -- or at least those on terrorist watch lists -- prohibited...schneier From Schneier on Security | February 10, 2010 at 06:39 PM
This appears not to be a joke:
The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...schneier From Schneier on Security | February 9, 2010 at 06:09 PM