From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Squid chair. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 8, 2015 at 05:04 PM
It helps if you own the banks: The report said Shor and his associates worked together in 2012 to buy a controlling stake in three Moldovan banks and then gradually...Bruce Schneier From Schneier on Security | May 8, 2015 at 07:13 AM
Interesting research: We identified three types of scams happening on Jiayuan. The first one involves advertising of escort services or illicit goods, and is very...Bruce Schneier From Schneier on Security | May 7, 2015 at 01:30 PM
Matthew Cole explains how the Italian police figured out how the CIA kidnapped Abu Omar in Milan. Interesting use of cell phone metadata, showing how valuable it...Bruce Schneier From Schneier on Security | May 6, 2015 at 09:35 PM
In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...Bruce Schneier From Schneier on Security | May 6, 2015 at 08:09 AM
Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...Bruce Schneier From Schneier on Security | May 5, 2015 at 07:59 AM
Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...Bruce Schneier From Schneier on Security | May 4, 2015 at 07:17 AM
It's an obvious biometric for cell phones: Bodyprint recognizes users by their ears with 99.8% precision with a false rejection rate of only 1 out of 13. Grip,...Bruce Schneier From Schneier on Security | May 1, 2015 at 01:46 PM
New research paper: "New methods for examining expertise in burglars in natural and simulated environments: preliminary findings": Expertise literature in mainstream...Bruce Schneier From Schneier on Security | April 30, 2015 at 03:22 PM
Google has a new Chrome extension called "Password Alert": To help keep your account safe, today we're launching Password Alert, a free, open-source Chrome extension...Bruce Schneier From Schneier on Security | April 30, 2015 at 10:14 AM
Interesting article. There are a lot of surveillance and privacy issues at play here....Bruce Schneier From Schneier on Security | April 29, 2015 at 07:12 AM
A drug dealer claims that the police leaned him over an 18th floor balcony and threatened to kill him if he didn't give up his password. One of the policemen involved...Bruce Schneier From Schneier on Security | April 28, 2015 at 01:50 PM
This is good: Just as "data" is being sold as "intelligence", a lot of security technologies are being sold as "security solutions" rather than what they for the...Bruce Schneier From Schneier on Security | April 28, 2015 at 07:21 AM
Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's...Bruce Schneier From Schneier on Security | April 27, 2015 at 07:27 AM
Interesting: While most female squid and octopuses have just one reproductive cycle before they die, vampire squid go through dozens of egg-making cycles in their...Bruce Schneier From Schneier on Security | April 24, 2015 at 05:43 PM