From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's easy:
Researchers from UCSD pointed thermal cameras towards plastic ATM PIN pads and metal ATM PIN pads to test how effective they were at stealing PIN numbers...schneier From Schneier on Security | August 24, 2011 at 12:13 PM
Clever:
"When the user types on the soft keyboard on her smartphone (especially when she holds her phone by hand rather than placing it on a fixed surface), the...schneier From Schneier on Security | August 23, 2011 at 07:09 PM
Worried about someone hacking your implanted medical devices? Here's a signal-jamming device you can wear.schneier From Schneier on Security | August 23, 2011 at 11:56 AM
Sleeve cameras aren't new, but they're now smaller than ever and the cheaters are getting more sophisticated:
In January, at the newly opened $4-billion Cosmopolitan...schneier From Schneier on Security | August 23, 2011 at 10:44 AM
Long essay on the value of pseudonymity. From the conclusions:
Here lies the huge irony in this discussion. Persistent pseudonyms aren't ways to hide who yoube...schneier From Schneier on Security | August 22, 2011 at 11:01 AM
Nice essay on the danger of too much security:
The great lie of the war on terror is not that we can sacrifice a little liberty for greater security. It is that...schneier From Schneier on Security | August 19, 2011 at 06:57 PM
Any institution delegated with the task of preventing terrorism has a dilemma: they can either do their best to prevent terrorism, or they can do their best toA...schneier From Schneier on Security | August 19, 2011 at 01:55 PM
It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker:
The discrepancy between the panic generated by terrorism and the deaths...schneier From Schneier on Security | August 18, 2011 at 06:32 PM
"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger.
Abstract. Since Rijndael was chosen as the Advanced...schneier From Schneier on Security | August 18, 2011 at 11:12 AM
A prison in Brazil uses geese as part of its alarm system.
There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...schneier From Schneier on Security | August 17, 2011 at 06:51 PM
Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.schneier From Schneier on Security | August 17, 2011 at 11:13 AM
Really interesting research.
Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high...schneier From Schneier on Security | August 16, 2011 at 03:47 PM
A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie:
Researchers at U.C. Berkeley have discovered that some of the net’s mostfinally...schneier From Schneier on Security | August 15, 2011 at 10:43 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | August 12, 2011 at 09:28 PM
My new book, Liars and Outliers, has a cover.
Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...schneier From Schneier on Security | August 12, 2011 at 07:09 PM
The African crested rat applies tree poison to its fur to make itself more deadly.
The researchers made their discovery after presenting a wild-caught crestedAcokanthera...schneier From Schneier on Security | August 12, 2011 at 04:13 PM