From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A potential new forensic:
To determine how similar a person's fingertip bacteria are to bacteria left on computer keys, the team took swabs from three computer...schneier From Schneier on Security | March 29, 2010 at 12:15 PM
Eerily accurate:
Catchy one-liner ("interesting," with link):
In this part of the blog post, Bruce quotes something from the article he links to in the catchy...schneier From Schneier on Security | March 26, 2010 at 06:16 PM
Modern photocopy machines contain hard drives that often have scans of old documents.
This matters when an office disposes of an old copier. It also matters if...schneier From Schneier on Security | March 26, 2010 at 04:27 PM
Nice paper: "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow," by Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang.
Abstract.explains...schneier From Schneier on Security | March 26, 2010 at 12:18 PM
James Fallows and I are being interviewed in Second Life tonight, 9:00 PM Eastern Time.
schneier From Schneier on Security | March 25, 2010 at 09:48 PM
Nice:
In this paper we revisit the assumption that shellcode need be fundamentally different in structure than non-executable data. Specifically, we elucidate...schneier From Schneier on Security | March 25, 2010 at 12:16 PM
Such "logic":
If a person on the no-fly list dies, his name could stay on the list so that the government can catch anyone trying to assume his identity.
Butanyone's...schneier From Schneier on Security | March 24, 2010 at 11:38 AM
I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...schneier From Schneier on Security | March 23, 2010 at 07:42 PM
In British Columbia:
When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...schneier From Schneier on Security | March 23, 2010 at 05:23 PM
Amazing:
The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...schneier From Schneier on Security | March 23, 2010 at 11:13 AM
MS Word has been dethroned:
Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...schneier From Schneier on Security | March 22, 2010 at 06:03 PM
This, from a former CIA chief of station:
The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...schneier From Schneier on Security | March 22, 2010 at 02:10 PM
Plastination:
For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...schneier From Schneier on Security | March 19, 2010 at 09:47 PM
This would worry me, if the liquid ban weren't already useless.
The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...schneier From Schneier on Security | March 19, 2010 at 05:58 PM
Interesting research:
Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...schneier From Schneier on Security | March 19, 2010 at 11:58 AM
Who didn't see this coming?
More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...schneier From Schneier on Security | March 18, 2010 at 10:26 AM