From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This book is available as a free pdf download:
The National Cyber Security Framework Manual provides detailed background information and in-depth theoretical frameworks...schneier From Schneier on Security | December 11, 2012 at 07:03 PM
Excellent article: "How to Shut Down Internets."
First, he describes what just happened in Syria. Then:
Egypt turned off the internet by using the Border Gateway...schneier From Schneier on Security | December 11, 2012 at 12:08 PM
Yet another way two-factor authentication has been bypassed:
For a user to fall prey to Eurograbber, he or she must first be using a computer infected with the...schneier From Schneier on Security | December 10, 2012 at 07:04 PM
Four squids on the cover of this week's Economist represent the four massive (and intrusive) data-driven Internet giants: Google, Facebook, Apple, and Amazon.
Interestingly...schneier From Schneier on Security | December 7, 2012 at 10:04 PM
Not the sort of pairing I normally think of, but:
Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh...schneier From Schneier on Security | December 6, 2012 at 04:59 PM
Another historical cipher, this one from the 1600s, has been cracked:
Senior math major Lucas Mason-Brown, who has done the majority of the decoding, said his...schneier From Schneier on Security | December 5, 2012 at 12:01 PM
It’s a feudal world out there.
Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android...schneier From Schneier on Security | December 3, 2012 at 01:24 PM
It's the size of a softball. No sign of the squid it came from.
As usual, you can also use this squid post to talk about the security stories in the news that...schneier From Schneier on Security | November 30, 2012 at 08:18 PM
Good article on how the Syrian government hacked into the computers of dissidents:
The cyberwar in Syria began with a feint. On Feb. 8, 2011, just as the Arabmanifesto...schneier From Schneier on Security | November 30, 2012 at 11:23 AM
Cash traps and card traps are the new thing:
[Card traps] involve devices that fit over the card acceptance slot and include a razor-edged spring trap that prevents...schneier From Schneier on Security | November 29, 2012 at 10:36 PM
Good article. I agree with the conclusion that the solution isn't to convince people to make better choices, but to change the IT architecture so that it's easier...schneier From Schneier on Security | November 28, 2012 at 11:55 AM
Some of the confetti at the Macy's Thanksgiving Day Parade in New York consisted of confidential documents from the Nassau County Police Department, shredded sideways...schneier From Schneier on Security | November 27, 2012 at 06:12 PM
Today only, O'Reilly is offering 50% off all its ebooks, including Liars and Outliers. This is probably the cheapest you'll find a DRM-free copy of the book. schneier From Schneier on Security | November 26, 2012 at 03:48 PM
The Naval Postgraduate School's Center for Homeland Defense and Security is running its sixth annual essay competition. There are cash prizes. (Info on previous...schneier From Schneier on Security | November 26, 2012 at 03:35 PM
Another squid comic.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | November 23, 2012 at 10:50 PM
"Recommendations to Prevent Catastrophic Threats." Federation of American Scientists, 9 November 2012. It's twelve specific sets of recommendations for twelvethis...schneier From Schneier on Security | November 23, 2012 at 12:18 PM