From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
You can wrap your house in tinfoil, but when you start shining bright lights to defend yourself against alien attack, you've gone too far. In general, society puts...Bruce Schneier From Schneier on Security | September 25, 2015 at 03:23 PM
No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates...Bruce Schneier From Schneier on Security | September 25, 2015 at 06:54 AM
In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the "combat mind-set." Here is his summary: In White...Bruce Schneier From Schneier on Security | September 24, 2015 at 12:39 PM
Fascinating story about a man who figured out how to hack the game show "Press Your Luck" in 1984....Bruce Schneier From Schneier on Security | September 23, 2015 at 07:05 AM
The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....Bruce Schneier From Schneier on Security | September 22, 2015 at 02:34 PM
Gizmodo reports that UK airport security confiscates frozen liquids: "He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid....Bruce Schneier From Schneier on Security | September 22, 2015 at 02:22 PM
FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case...Bruce Schneier From Schneier on Security | September 21, 2015 at 12:45 PM
Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took...Bruce Schneier From Schneier on Security | September 21, 2015 at 07:34 AM
It looks impressive, maybe 20-30 feet long: "I think this might be the coolest thing I have ever built," said Barry Crawford about his giant, metal squid that was...Bruce Schneier From Schneier on Security | September 19, 2015 at 01:33 PM
Here's a watch that monitors the movements of your hand and can guess what you're typing. Using the watch's built-in motion sensors, more specifically data from...Bruce Schneier From Schneier on Security | September 18, 2015 at 06:20 AM
Okay, this is weird. FireEye has gone to court to prevent ERNW from disclosing vulnerabilities in FireEye products. FireEye should know better. Here's FireEye's...Bruce Schneier From Schneier on Security | September 17, 2015 at 01:56 PM
The chip is built on glass: Shattering the glass is straightforward. When the proper circuit is toggled, a small resistor within the substrate heats up until the...Bruce Schneier From Schneier on Security | September 17, 2015 at 08:17 AM
A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...Bruce Schneier From Schneier on Security | September 16, 2015 at 02:40 PM
A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...Bruce Schneier From Schneier on Security | September 16, 2015 at 11:09 AM
President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...Bruce Schneier From Schneier on Security | September 16, 2015 at 07:05 AM
When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...Bruce Schneier From Schneier on Security | September 15, 2015 at 07:38 AM
Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...Bruce Schneier From Schneier on Security | September 14, 2015 at 07:26 AM
Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 11, 2015 at 05:13 PM