From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice research:
Abstract: We report a novel attack on two CAPTCHAs that have been widely deployed on the Internet, one being Google's home design and the other...schneier From Schneier on Security | October 12, 2011 at 11:57 AM
You'd think we would be more careful than this:
A computer virus has infected the cockpits of Americaschneier From Schneier on Security | October 10, 2011 at 11:38 AM
Humboldt squid are washing up on beaches across Southern California. Seems like it's no big deal; the squid just swam too close to shore.schneier From Schneier on Security | October 7, 2011 at 09:51 PM
Related to this blog post from Wednesday, here's a paper that looks at security seals on voting machines.
Andrew W. Appel, "Security Seals on Voting Machines:...schneier From Schneier on Security | October 7, 2011 at 06:11 PM
From a review of Susan Landau's Surveillance or Security?:
To catch up with the new technologies of malfeasance, FBI director Robert Mueller traveled to Silicon...schneier From Schneier on Security | October 7, 2011 at 11:01 AM
Last weekend, I completely reframed the book. I realized that the book isn't about security. It's about trust. I'm writing about how society induces people to...schneier From Schneier on Security | October 6, 2011 at 12:38 AM
This is both news and not news:
Indeed, the Argonne team's attack required no modification, reprogramming, or even knowledge, of the voting machine's proprietary...schneier From Schneier on Security | October 5, 2011 at 11:58 AM
October is National Cybersecurity Awareness Month, sponsored by the Department of Homeland Security. The website has some sample things you can do to to celebrate...schneier From Schneier on Security | October 4, 2011 at 11:31 AM
A great find:
In his 1956 short story, "Let's Get Together," Isaac Asimov describes security measures proposed to counter a terrorist threat:
"Consider further...schneier From Schneier on Security | October 3, 2011 at 06:20 PM
Custom HTC firmware breaks standard permissions and allows rogue apps to access location, address book, and account info without authorization.schneier From Schneier on Security | October 3, 2011 at 11:35 AM
An analysis of extensions to the Chrome browser shows that 25% of them are insecure:
We reviewed 100 Chrome extensions and found that 27 of the 100 extensions...schneier From Schneier on Security | September 29, 2011 at 11:59 AM
Iran blocks Tor, and Tor releases a workaround on the same day.
How did the filter work technically? Tor tries to make its traffic look like a web browser talking...schneier From Schneier on Security | September 26, 2011 at 09:31 AM
There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female.
This unusual behaviour, they...schneier From Schneier on Security | September 23, 2011 at 09:28 PM
It's the Browser Exploit Against SSL/TLS Tool, or BEAST:
The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...schneier From Schneier on Security | September 23, 2011 at 06:37 PM
On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...schneier From Schneier on Security | September 23, 2011 at 11:17 AM