From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good paper: "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," by Jerry Brito and Tate Watkins.
Over the past two years there has...schneier From Schneier on Security | April 28, 2011 at 11:56 AM
It's standard sociological theory that a group experiences social solidarity in response to external conflict. This paper studies the phenomenon in the Unitednew...schneier From Schneier on Security | April 27, 2011 at 02:10 PM
As I've written before, I run an open WiFi network. It's stories like these that may make me rethink that.
The three stories all fall along the same theme: a...schneier From Schneier on Security | April 26, 2011 at 11:59 AM
Clever:
Khan and his colleagues have written software that ensures clusters of a file, rather than being positioned at the whim of the disc drive controller chip...schneier From Schneier on Security | April 25, 2011 at 10:24 AM
Okay, this is a little weird:
This year's Earth Day will again include the celebrated "squid printing" activity with two big, beautiful Pacific Humboldt squidagain...schneier From Schneier on Security | April 22, 2011 at 09:30 PM
The CIA has just declassified six (1, 2, 3, 4, 5, and 6) documents about World War I security techniques. (The media is reporting they're CIA documents, but the...schneier From Schneier on Security | April 21, 2011 at 11:38 AM
A criminal gang is stealing truckloads of food:
Late last month, a gang of thieves stole six tractor-trailer loads of tomatoes and a truck full of cucumbers from...schneier From Schneier on Security | April 20, 2011 at 11:52 AM
Interesting blog post on the security costs for the $50B Air Force bomber program -- estimated to be $8B. This isn't all computer security, but the original article...schneier From Schneier on Security | April 20, 2011 at 11:31 AM
Increasingly, chains of evidence include software steps. It's not just the RIAA suing people -- and getting it wrong -- based on automatic systems to detect and...schneier From Schneier on Security | April 19, 2011 at 11:47 AM
We know it's prevalent, but there's some new information:
Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party...schneier From Schneier on Security | April 18, 2011 at 02:33 PM
Back in 1998, I wrote:
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.
In 2004, Cory Doctorow...schneier From Schneier on Security | April 15, 2011 at 06:45 PM
In Japan, lots of people -- especially older people -- keep their life savings in cash in their homes. (The country's banks pay very low interest rates, so the...schneier From Schneier on Security | April 15, 2011 at 11:49 AM
One of the things I am writing about in my new book is how security equilibriums change. They often change because of technology, but they sometimes change because...schneier From Schneier on Security | April 14, 2011 at 11:36 AM
The London Underground is getting Wi-Fi. Of course there are security fears:
But Will Geddes, founder of ICP Group which specialises in reducing terror or technology...schneier From Schneier on Security | April 13, 2011 at 06:14 PM
This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...schneier From Schneier on Security | April 13, 2011 at 11:25 AM
You'd think the country would already have one of these:
Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...schneier From Schneier on Security | April 12, 2011 at 07:06 PM
Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...schneier From Schneier on Security | April 12, 2011 at 11:03 AM
I didn't know about this:
The law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers.
This...schneier From Schneier on Security | April 11, 2011 at 06:20 PM