From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting:
3 – Spreading the reflective pieces of glass on a car or on the roof of the building.
4 – Placing a group of skilled snipers to hunt the drone, especially...schneier From Schneier on Security | March 6, 2013 at 12:50 PM
Marcus Ranum has an interesting screed on "booth babes" in the RSA Conference exhibition hall:
I'm not making a moral argument about sexism in our industry orsame...schneier From Schneier on Security | March 5, 2013 at 07:58 PM
It's a new day for the New York Police Department, with technology increasingly informing the way cops do their jobs. With innovation comes new possibilities but...schneier From Schneier on Security | March 5, 2013 at 12:28 PM
I hadn't heard of this one before. In New Zealand, people viewing adult websites -- it's unclear whether these are honeypot sites, or malware that notices thepop...schneier From Schneier on Security | March 4, 2013 at 08:04 PM
One of the problems with motivating proper security behavior within an organization is that the incentives are all wrong. It doesn't matter how much management...schneier From Schneier on Security | March 4, 2013 at 12:38 PM
Another.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 1, 2013 at 10:36 PM
This isn't phishing; it's not even spear phishing. It's laser-guided precision phishing:
One of the leaked diplomatic cables referred to one attack via emailwrote...schneier From Schneier on Security | March 1, 2013 at 11:05 AM
Recently, Elon Musk and the New York Times took to Twitter and the Internet to argue the data -- and their grievances -- over a failed road test and car review....schneier From Schneier on Security | February 28, 2013 at 08:40 PM
Three brazen robberies are in the news this week.
The first was a theft at a small museum of gold nuggets worth $750,000:
Police said the daring heist happened...schneier From Schneier on Security | February 28, 2013 at 12:35 PM
Obituary here. His 1967 book, Privacy and Freedom, almost single-handedly created modern privacy law. schneier From Schneier on Security | February 27, 2013 at 07:26 PM
Good summary list. It's not directly about security, but it's all fundamentally about security. Any real-world security system is inherently complex. I wrote...schneier From Schneier on Security | February 27, 2013 at 01:09 PM
Someone has analyzed the security mistakes in the Battle of Hoth, from the movie The Empire Strikes Back.schneier From Schneier on Security | February 26, 2013 at 07:38 PM
I would have liked to participate in this hearing: Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency: "Assessing DHS 10 Years"...schneier From Schneier on Security | February 26, 2013 at 01:10 PM
I'll be speaking twice at the RSA Conference this year. I'm giving a solo talk Tuesday at 1:00, and participating in a debate about training Wednesday at noon....schneier From Schneier on Security | February 25, 2013 at 07:49 PM
The Montréal Review asked me to write an essay about my latest book. Not much that regular readers haven't seen before.schneier From Schneier on Security | February 25, 2013 at 11:52 AM
Funny.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 22, 2013 at 10:38 PM
I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.
schneier From Schneier on Security | February 22, 2013 at 08:21 PM
As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...schneier From Schneier on Security | February 22, 2013 at 05:12 PM
This is interesting:
In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...schneier From Schneier on Security | February 22, 2013 at 12:03 PM