From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I would have liked to participate in this hearing: Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency: "Assessing DHS 10 Years"...schneier From Schneier on Security | February 26, 2013 at 01:10 PM
I'll be speaking twice at the RSA Conference this year. I'm giving a solo talk Tuesday at 1:00, and participating in a debate about training Wednesday at noon....schneier From Schneier on Security | February 25, 2013 at 07:49 PM
The Montréal Review asked me to write an essay about my latest book. Not much that regular readers haven't seen before.schneier From Schneier on Security | February 25, 2013 at 11:52 AM
Funny.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 22, 2013 at 10:38 PM
I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.
schneier From Schneier on Security | February 22, 2013 at 08:21 PM
As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...schneier From Schneier on Security | February 22, 2013 at 05:12 PM
This is interesting:
In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...schneier From Schneier on Security | February 22, 2013 at 12:03 PM
Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency...schneier From Schneier on Security | February 21, 2013 at 06:54 PM
Interesting research (full article is behind a paywall):
Abstract: Older adults are disproportionately vulnerable to fraud, and federal agencies have speculated...schneier From Schneier on Security | February 21, 2013 at 01:24 PM
How international soccer matches are fixed.
Right now, Dan Tan's programmers are busy reverse-engineering the safeguards of online betting houses. About $3 billion...schneier From Schneier on Security | February 20, 2013 at 01:29 PM
There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...schneier From Schneier on Security | February 19, 2013 at 06:52 PM
After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...schneier From Schneier on Security | February 18, 2013 at 07:43 PM
Tesla Motors gave one of its electric cars to John Broder, a very outspoken electric-car skeptic from the New York Times, for a test drive. After a negative review...schneier From Schneier on Security | February 18, 2013 at 12:14 PM
Japanese squid researchers have confirmed flying squid can fly, and how they do it. (Note: I have written about flying squid before.)
As usual, you can also use...schneier From Schneier on Security | February 15, 2013 at 10:09 PM
This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...schneier From Schneier on Security | February 15, 2013 at 06:52 PM
"Practicality of Accelerometer Side Channels on Smartphones," by Adam J. Aviv. Benjamin Sapp, Matt Blaze, and Jonathan M. Smith.
Abstract: Modern smartphonesArticle...schneier From Schneier on Security | February 15, 2013 at 12:48 PM
Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...schneier From Schneier on Security | February 14, 2013 at 05:42 PM
Long article.
With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...schneier From Schneier on Security | February 14, 2013 at 12:32 PM