From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In British Columbia:
When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...schneier From Schneier on Security | March 23, 2010 at 05:23 PM
Amazing:
The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...schneier From Schneier on Security | March 23, 2010 at 11:13 AM
MS Word has been dethroned:
Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...schneier From Schneier on Security | March 22, 2010 at 06:03 PM
This, from a former CIA chief of station:
The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...schneier From Schneier on Security | March 22, 2010 at 02:10 PM
Plastination:
For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...schneier From Schneier on Security | March 19, 2010 at 09:47 PM
This would worry me, if the liquid ban weren't already useless.
The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...schneier From Schneier on Security | March 19, 2010 at 05:58 PM
Interesting research:
Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...schneier From Schneier on Security | March 19, 2010 at 11:58 AM
Who didn't see this coming?
More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...schneier From Schneier on Security | March 18, 2010 at 10:26 AM
Interesting research:
Analysing our data for security, though, shows that essentially all human-generated names provide poor resistance to guessing. For an attacker...schneier From Schneier on Security | March 16, 2010 at 11:44 AM
Here's a promotional security product designed by someone who knows nothing about security. The USB drive is "protected" by a combination lock. There are only...schneier From Schneier on Security | March 15, 2010 at 06:59 PM
"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman:
Abstract. We describe a method for identifying "typosquatting",...schneier From Schneier on Security | March 15, 2010 at 09:33 AM
A hollowed-out U.S. nickel can hold a microSD card. Pound and euro coins are also available. I blogged about this about a year ago as well.
schneier From Schneier on Security | March 12, 2010 at 12:58 PM
It's good to dream:
IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...schneier From Schneier on Security | March 11, 2010 at 12:17 PM
Really:
Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance.
The researchers say noses have been overlooked...schneier From Schneier on Security | March 10, 2010 at 07:47 PM
Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...schneier From Schneier on Security | March 10, 2010 at 01:09 PM