From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Design failure means you can pick winning tickets before scratching the coatings off. Most interesting is that there's statistical evidence that this sort of attack...schneier From Schneier on Security | February 10, 2011 at 12:42 PM
I was interviewed for this story on a mouse-powered explosives detector. Animal senses are better than any detection machine current technology can build, which...schneier From Schneier on Security | February 9, 2011 at 05:39 PM
I'd never heard the term "micromort" before. It's a probability: a one-in-a-million probability of death. For example, one-micromort activities are "travelling...schneier From Schneier on Security | February 8, 2011 at 11:46 AM
Scareware is fraudulent software that uses deceptive advertising to trick users into believing they're infected with some variety of malware, then convinces them...schneier From Schneier on Security | February 7, 2011 at 02:45 PM
Research from Japan: "Improvement of 'kurozukuri ika-shiokara' (fermented squid meat with ink) odor with Staphylococcus nepalensis isolated from the fish sauce...schneier From Schneier on Security | February 4, 2011 at 10:33 PM
A UK immigration officer decided to get rid of his wife by putting her on the no-fly list, ensuring that she could not return to the UK from abroad. This worked...schneier From Schneier on Security | February 4, 2011 at 07:35 PM
This makes sense.
Generally, militants prefer to attack soft targets where there are large groups of people, that are symbolic and recognizable around the world...schneier From Schneier on Security | February 4, 2011 at 12:00 PM
This is a clever development in ATM skimming technology. It's a skimmer that attaches to the ATM-room door lock, not the ATM itself. Combined with a hidden camera...schneier From Schneier on Security | February 3, 2011 at 11:54 AM
One website can learn if you're logged into other websites.
When you visit my website, I can automatically and silently determine if you're logged into Facebook...schneier From Schneier on Security | February 2, 2011 at 08:26 PM
This is the first piece of writing I've seen from Kip Hawley since he left the TSA in 2009. It's mostly generalities and platitudes.
schneier From Schneier on Security | February 2, 2011 at 12:42 PM
I wrote an op-ed for CNN.com on the demise of the color-coded terrorist theat level system. It's nothing I haven't said before, so I won't reprint it here.
The...schneier From Schneier on Security | February 1, 2011 at 01:40 PM
The Seattle man who refused to show ID to the TSA and recorded the whole incident has been cleared of all charges:
[The jury] returned not guilty verdicts forPapers...schneier From Schneier on Security | January 31, 2011 at 12:56 PM
It's only a proof of concept, but it's scary nonetheless. It's a Trojan for Android phones that looks for credit-card numbers, either typed or spoken, and relays...schneier From Schneier on Security | January 29, 2011 at 01:45 PM
I haven't written anything about the suicide bombing at Moscow's Domodedovo Airport because I didn't think there was anything to say. The bomber was outside the...schneier From Schneier on Security | January 28, 2011 at 09:15 PM
An undercover TSA agent successfully bribed JetBlue ticket agent to check a suitcase under a random passenger's name and put it on an airplane.
As with a lot of...schneier From Schneier on Security | January 28, 2011 at 07:40 PM
The whitelist/blacklist debate is far older than computers, and it's instructive to recall what works where. Physical security works generally on a whitelist model...schneier From Schneier on Security | January 28, 2011 at 02:20 PM
As the article says, it doesn't get any more ironic than that.
More importantly, it demonstrates how hard it is to keep secrets in the age of the Internet.
...schneier From Schneier on Security | January 27, 2011 at 12:22 PM
This is a bit surreal:
Additional steps are needed to prepare Broadway theaters in New York City for a potential WMD attack or other crisis, a New York state legislature...schneier From Schneier on Security | January 26, 2011 at 07:42 PM
It's amazing how many security cameras are on the Internet, accessible by anyone.
And it's not just for viewing; a lot of these cameras can be reprogrammed by...schneier From Schneier on Security | January 26, 2011 at 12:28 PM