From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Abstract: The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough toScience...schneier From Schneier on Security | June 29, 2012 at 11:35 AM
Interesting review -- by David Roepik -- of The Rise of Nuclear Fear, by Spencer Weart:
Along with contributing to the birth of the environmental movement, Weart...schneier From Schneier on Security | June 28, 2012 at 01:50 PM
I'm reading Top Secret America: The Rise of the New American Security State, by Dana Priest and William M. Arkin. Both work for The Washington Post. The book...schneier From Schneier on Security | June 27, 2012 at 11:35 AM
If the safe doesn't open, use a sledgehammer:
The sledgehammer's existence first came to light in 1980, when a group of inspecting officers from the General Staff...schneier From Schneier on Security | June 27, 2012 at 11:30 AM
This informal survey produced the following result: "45% of the users found their email accounts more valuable than their bank accounts."
The author believes this...schneier From Schneier on Security | June 26, 2012 at 06:57 PM
There was a conference on resilience (highlights here, and complete videos here) earlier this year. Here's an interview with professor Sander van der Leeuw on...schneier From Schneier on Security | June 25, 2012 at 04:17 PM
I think this is a parody, but you can never be sure.
Millions of Britons turned out for the Queenschneier From Schneier on Security | June 22, 2012 at 09:03 PM
Yes, it's clever:
The basic problem is the average haul from a bank job: for the three-year period, it was only schneier From Schneier on Security | June 22, 2012 at 12:20 PM
Interesting conclusion by Cormac Herley, in this paper: "Why Do Nigerian Scammers Say They are From Nigeria?"
Abstract: False positives cause many promising detection...schneier From Schneier on Security | June 21, 2012 at 06:03 PM
It's not a new idea, but Apple Computer has received a patent on "Techniques to pollute electronic profiling":
Abstract: Techniques to pollute electronic profiling...schneier From Schneier on Security | June 21, 2012 at 10:51 AM
Interesting blog post about this book about Switzerland's national defense.
To make a long story short, McPhee describes two things: how Switzerland requires military...schneier From Schneier on Security | June 20, 2012 at 12:27 PM
Clever attack:
When you pay a restaurant bill at your table using a point-of-sale machine, are you sure it's legit? In the past three months, Toronto and Peel...schneier From Schneier on Security | June 19, 2012 at 06:02 PM
Mikko Hyponnen of F-Secure attempts to explain why anti-virus companies didn't catch Stuxnet, DuQu, and Flame:
When we went digging through our archive for related...schneier From Schneier on Security | June 19, 2012 at 02:35 PM
On banning guns:
"If a cricketer, for instance, suddenly decided to go into a school and batter a lot of people to death with a cricket bat,which he could do very...schneier From Schneier on Security | June 18, 2012 at 05:38 PM
Many roadside farm stands in the U.S. are unmanned. They work on the honor system: take what you want, and pay what you owe.
And today at his farm stand, Cochran...schneier From Schneier on Security | June 18, 2012 at 11:40 AM
This story is so freaky I'm not even sure I want to post it. But if I don't, you'll all send me the links.
As usual, you can also use this squid post to talk...schneier From Schneier on Security | June 15, 2012 at 09:02 PM
On Sunday, I will be participating in a public discussion about my new book on the FireDogLake website. James Fallows will be the moderator, and I will be answering...schneier From Schneier on Security | June 15, 2012 at 07:55 PM