From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
MobileScope looks like a great tool for monitoring and controlling what information third parties get from your smart phone apps:
We built MobileScope as a proof...schneier From Schneier on Security | May 11, 2012 at 11:42 AM
All RuggedCom equipment comes with a built-in backdoor:
The backdoor, which cannot be disabled, is found in all versions of the Rugged Operating System made by...schneier From Schneier on Security | May 9, 2012 at 11:24 AM
We don't know much, but here are my predictions:
There's a lot more hyperbole to this story than reality.
The explosive would have either 1) been caught by pre...schneier From Schneier on Security | May 8, 2012 at 06:14 PM
This is a ridiculous overreaction:
The police bomb squad was called to 2 World Financial Center in lower Manhattan at midday when a security guard reported a package...schneier From Schneier on Security | May 8, 2012 at 12:03 PM
With all the talk about airborne drones like the Predator, it's easy to forget that drones can be in the water as well. Meet the Common Unmanned Surface Vessel...schneier From Schneier on Security | May 7, 2012 at 11:52 AM
Neat.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | May 4, 2012 at 09:01 PM
This vendor is selling a tampon-shaped USB drive. Although it's less secure now that there are blog posts about it.schneier From Schneier on Security | May 4, 2012 at 06:31 PM
I suppose this sort of thing might be useful someday.
In Second Life, avatars are easily identified by their username, meaning police can just ask San Francisco...schneier From Schneier on Security | May 4, 2012 at 11:31 AM
I've often written about the base rate fallacy and how it makes tests for rare events -- like airplane terrorists -- useless because the false positives vastlyThis...schneier From Schneier on Security | May 3, 2012 at 11:22 AM
The reports are still early, but it seems that a bunch of terrorist planning documents were found embedded in a digital file of a porn movie.
Several weeks later...schneier From Schneier on Security | May 2, 2012 at 05:41 PM
Two very interesting points in this essay on cybercrime. The first is that cybercrime isn't as big a problem as conventional wisdom makes it out to be.
We have...schneier From Schneier on Security | May 2, 2012 at 12:10 PM
I've long advocated investigation, intelligence, and emergency response as the places where we can most usefully spend our counterterrorism dollars. Here's anthat...schneier From Schneier on Security | May 1, 2012 at 12:31 PM
Army General Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, said:
A cyber attack could stop our society in its tracks.
Gadzooks. A scared populace...schneier From Schneier on Security | April 30, 2012 at 11:52 AM
Actionable Books is having a vote to determine which of four books to summarize on their site. If you are willing, please go there and vote for Liars and Outliers...schneier From Schneier on Security | April 28, 2012 at 12:57 AM
Great pictures.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 27, 2012 at 04:32 PM
At the RSA Conference this year, I noticed a trend of companies that have products and services designed to help victims recover from attacks. Kelly Jackson Higgins...schneier From Schneier on Security | April 27, 2012 at 11:53 AM
Last year, I wrote about how social media sites are making it harder than ever for undercover police officers. This story talks about how biometric passports are...schneier From Schneier on Security | April 26, 2012 at 11:57 AM
danah boyd is thinking about -- in a draft essay, and as a recording of a presentation -- fear and the attention economy. Basically, she is making the argument...schneier From Schneier on Security | April 25, 2012 at 11:51 AM
In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...schneier From Schneier on Security | April 24, 2012 at 04:44 PM