From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...Bruce Schneier From Schneier on Security | June 10, 2015 at 07:43 AM
This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...Bruce Schneier From Schneier on Security | June 9, 2015 at 09:15 AM
Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...Bruce Schneier From Schneier on Security | June 8, 2015 at 01:48 PM
Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...Bruce Schneier From Schneier on Security | June 8, 2015 at 07:09 AM
Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...Bruce Schneier From Schneier on Security | June 5, 2015 at 05:51 PM
The news media is buzzing about how the US military identified the location of an ISIS HQ because someone there took a photo and posted it. Quoting Air Force General...Bruce Schneier From Schneier on Security | June 5, 2015 at 03:38 PM
The latest story from the Snowden documents, co-published by The New York Times and ProPublica, shows that the NSA is operating a signature-based intrusion detection...Bruce Schneier From Schneier on Security | June 5, 2015 at 08:43 AM
New research: In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of...Bruce Schneier From Schneier on Security | June 4, 2015 at 11:36 AM
Monday night, EPIC -- that's the Electronic Privacy Information Center -- had its annual Champions of Freedom Dinner. I tell you this for two reasons. One, I received...Bruce Schneier From Schneier on Security | June 3, 2015 at 05:31 PM
There are smart billboards in Russia that change what they display when cops are watching. Of course there are a gazillion ways this kind of thing will go wrong...Bruce Schneier From Schneier on Security | June 3, 2015 at 03:15 PM
This isn't good: An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation's busiest airports,...Bruce Schneier From Schneier on Security | June 2, 2015 at 08:39 AM
Okay, maybe not so fun. Quiz 1: "Just How Kafkaesque is the Court that Oversees NSA Spying?" Quiz 2: "Can You Tell the Difference Between Bush and Obama on the...Bruce Schneier From Schneier on Security | June 1, 2015 at 02:12 PM
According to a Reuters article, the US military tried to launch Stuxnet against North Korea in addition to Iran: According to one U.S. intelligence source, Stuxnet's...Bruce Schneier From Schneier on Security | June 1, 2015 at 07:33 AM
It's almost as if they wrote it for me. These devices, which are known as super conducting quantum interference devices (SQUIDS for short), can be attached to NSA...Bruce Schneier From Schneier on Security | May 31, 2015 at 05:08 PM
United Nation's Office of the High Commissioner released a report on the value of encryption and anonymity to the world: Summary: In the present report, submitted...Bruce Schneier From Schneier on Security | May 29, 2015 at 08:49 AM
The University of Adelaide is offering a new MOOC on "Cyberwar, Surveillance and Security." Here's a teaser video. I was interviewed for the class, and make a brief...Bruce Schneier From Schneier on Security | May 28, 2015 at 08:19 AM
I don't know enough about the methodology to judge it, but it's interesting: In total, 64 cities are categorised as 'extreme risk' in Verisk Maplecroft's new Global...Bruce Schneier From Schneier on Security | May 27, 2015 at 08:51 AM
A researcher was able to steal money from Starbucks by exploiting a race condition in their gift-card value-transfer protocol. Basically, by initiating two identical...Bruce Schneier From Schneier on Security | May 26, 2015 at 05:58 PM