From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
According to a report by Juniper, mobile malware is increasing dramatically.
In 2011, we saw unprecedented growth of mobile malware attacks with a 155 percentstory...schneier From Schneier on Security | February 23, 2012 at 12:27 PM
Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...schneier From Schneier on Security | February 21, 2012 at 01:36 PM
Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...schneier From Schneier on Security | February 20, 2012 at 12:30 PM
Beautiful sculpture.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 17, 2012 at 10:37 PM
Self-domestication happens when the benefits of cooperation outweigh the costs:
But why and how could natural selection tame the bonobo? One possible narrative...schneier From Schneier on Security | February 17, 2012 at 10:21 AM
From the abstract of the paper:
In this paper, we analyze the encryption systems used in the two existing (and competing) satphone standards, GMR-1 and GMR-2....schneier From Schneier on Security | February 16, 2012 at 06:22 PM
There's some excellent research (paper, news articles) surveying public keys in the wild. Basically, the researchers found that a small fraction of them (27,000...schneier From Schneier on Security | February 16, 2012 at 12:51 PM
Geotagged images of children:
Joanne Kuzma of the University of Worcester, England, has analyzed photos that clearly show children's faces on the photo sharing...schneier From Schneier on Security | February 15, 2012 at 07:11 PM
This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine:
Now, personally, I sincerely...schneier From Schneier on Security | February 15, 2012 at 01:09 PM
Adam Shostack explains to Verisign that trust requires transparency.
This is a lesson Path should have learned.schneier From Schneier on Security | February 14, 2012 at 01:12 PM
Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...schneier From Schneier on Security | February 13, 2012 at 08:53 PM
Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...schneier From Schneier on Security | February 13, 2012 at 11:20 AM
It's an acoustic bluegrass band.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 10, 2012 at 10:04 PM
Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security.
Abstract: Since...schneier From Schneier on Security | February 9, 2012 at 12:10 PM