From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Earlier this week, I was at the eighth Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various aspects of the...Bruce Schneier From Schneier on Security | June 11, 2015 at 02:47 PM
News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport security "red team" tests was justifiably shocking...Bruce Schneier From Schneier on Security | June 11, 2015 at 07:10 AM
Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why...Bruce Schneier From Schneier on Security | June 10, 2015 at 04:27 PM
Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents...Bruce Schneier From Schneier on Security | June 10, 2015 at 12:27 PM
Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...Bruce Schneier From Schneier on Security | June 10, 2015 at 07:43 AM
This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...Bruce Schneier From Schneier on Security | June 9, 2015 at 09:15 AM
Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...Bruce Schneier From Schneier on Security | June 8, 2015 at 01:48 PM
Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...Bruce Schneier From Schneier on Security | June 8, 2015 at 07:09 AM
Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...Bruce Schneier From Schneier on Security | June 5, 2015 at 05:51 PM
The news media is buzzing about how the US military identified the location of an ISIS HQ because someone there took a photo and posted it. Quoting Air Force General...Bruce Schneier From Schneier on Security | June 5, 2015 at 03:38 PM
The latest story from the Snowden documents, co-published by The New York Times and ProPublica, shows that the NSA is operating a signature-based intrusion detection...Bruce Schneier From Schneier on Security | June 5, 2015 at 08:43 AM
New research: In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of...Bruce Schneier From Schneier on Security | June 4, 2015 at 11:36 AM
Monday night, EPIC -- that's the Electronic Privacy Information Center -- had its annual Champions of Freedom Dinner. I tell you this for two reasons. One, I received...Bruce Schneier From Schneier on Security | June 3, 2015 at 05:31 PM
There are smart billboards in Russia that change what they display when cops are watching. Of course there are a gazillion ways this kind of thing will go wrong...Bruce Schneier From Schneier on Security | June 3, 2015 at 03:15 PM
This isn't good: An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation's busiest airports,...Bruce Schneier From Schneier on Security | June 2, 2015 at 08:39 AM
Okay, maybe not so fun. Quiz 1: "Just How Kafkaesque is the Court that Oversees NSA Spying?" Quiz 2: "Can You Tell the Difference Between Bush and Obama on the...Bruce Schneier From Schneier on Security | June 1, 2015 at 02:12 PM
According to a Reuters article, the US military tried to launch Stuxnet against North Korea in addition to Iran: According to one U.S. intelligence source, Stuxnet's...Bruce Schneier From Schneier on Security | June 1, 2015 at 07:33 AM
It's almost as if they wrote it for me. These devices, which are known as super conducting quantum interference devices (SQUIDS for short), can be attached to NSA...Bruce Schneier From Schneier on Security | May 31, 2015 at 05:08 PM
United Nation's Office of the High Commissioner released a report on the value of encryption and anonymity to the world: Summary: In the present report, submitted...Bruce Schneier From Schneier on Security | May 29, 2015 at 08:49 AM