From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I worry that comments about the value of software security made at the RSA Conference last week will be taken out of context. John Viega did not say that software...schneier From Schneier on Security | March 11, 2013 at 11:12 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 8, 2013 at 10:06 PM
The second edition of Ross Anderson's fantastic book, Security Engineering, is now free online. Required reading for any security engineer.schneier From Schneier on Security | March 8, 2013 at 06:08 PM
Google Docs is being used for phishing. Oxford University felt that it had to block the service because Google isn't responding to takedown requests quickly enough...schneier From Schneier on Security | March 8, 2013 at 12:23 PM
Good article on "Stingrays," which the FBI uses to monitor cell phone data. Basically, they trick the phone into joining a fake network. And, since cell phones...schneier From Schneier on Security | March 7, 2013 at 07:39 PM
Interesting discussion on browser security from Communications of the ACM. Also, an article on browser and web privacy from the same issue.schneier From Schneier on Security | March 7, 2013 at 12:45 PM
A new book reveals details about the NSA's Ragtime surveillance program:
A book published earlier this month, "Deep State: Inside the Government Secrecy Industry...schneier From Schneier on Security | March 6, 2013 at 07:24 PM
Interesting:
3 – Spreading the reflective pieces of glass on a car or on the roof of the building.
4 – Placing a group of skilled snipers to hunt the drone, especially...schneier From Schneier on Security | March 6, 2013 at 12:50 PM
Marcus Ranum has an interesting screed on "booth babes" in the RSA Conference exhibition hall:
I'm not making a moral argument about sexism in our industry orsame...schneier From Schneier on Security | March 5, 2013 at 07:58 PM
It's a new day for the New York Police Department, with technology increasingly informing the way cops do their jobs. With innovation comes new possibilities but...schneier From Schneier on Security | March 5, 2013 at 12:28 PM
I hadn't heard of this one before. In New Zealand, people viewing adult websites -- it's unclear whether these are honeypot sites, or malware that notices thepop...schneier From Schneier on Security | March 4, 2013 at 08:04 PM
One of the problems with motivating proper security behavior within an organization is that the incentives are all wrong. It doesn't matter how much management...schneier From Schneier on Security | March 4, 2013 at 12:38 PM
Another.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 1, 2013 at 10:36 PM
This isn't phishing; it's not even spear phishing. It's laser-guided precision phishing:
One of the leaked diplomatic cables referred to one attack via emailwrote...schneier From Schneier on Security | March 1, 2013 at 11:05 AM
Recently, Elon Musk and the New York Times took to Twitter and the Internet to argue the data -- and their grievances -- over a failed road test and car review....schneier From Schneier on Security | February 28, 2013 at 08:40 PM
Three brazen robberies are in the news this week.
The first was a theft at a small museum of gold nuggets worth $750,000:
Police said the daring heist happened...schneier From Schneier on Security | February 28, 2013 at 12:35 PM
Obituary here. His 1967 book, Privacy and Freedom, almost single-handedly created modern privacy law. schneier From Schneier on Security | February 27, 2013 at 07:26 PM
Good summary list. It's not directly about security, but it's all fundamentally about security. Any real-world security system is inherently complex. I wrote...schneier From Schneier on Security | February 27, 2013 at 01:09 PM
Someone has analyzed the security mistakes in the Battle of Hoth, from the movie The Empire Strikes Back.schneier From Schneier on Security | February 26, 2013 at 07:38 PM