From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.schneier From Schneier on Security | February 8, 2013 at 08:41 PM
This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...schneier From Schneier on Security | February 8, 2013 at 05:20 PM
A first-person account of the security surrounding the second inauguration of President Obama.schneier From Schneier on Security | February 8, 2013 at 12:16 PM
Basically, Tide detergent is a popular product with a very small profit margin. So small non-chain grocery and convenience stores are happy to buy it cheaply,started...schneier From Schneier on Security | February 7, 2013 at 06:51 PM
Google's contest at the CanSecWest conference:
Today we’re announcing our third Pwnium competitionPwnium 3. Google Chrome is already featured in the Pwn2Own competition...schneier From Schneier on Security | February 7, 2013 at 12:35 PM
This was big news last week, and I spent a lot of time doing press interviews about it. But while it is an important story -- hacking a newspaper, looking forGhostNet...schneier From Schneier on Security | February 6, 2013 at 12:36 PM
I just printed this out: "Proactive Defense for Evolving Cyber Threats," a Sandia Report by Richard Colbaugh and Kristin Glass. It's a collection of academic...schneier From Schneier on Security | February 5, 2013 at 01:38 PM
I don't see a lot written about security seals, despite how common they are. This article is a very basic overview of the technologies.schneier From Schneier on Security | February 4, 2013 at 07:43 PM
Interesting:
"It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...schneier From Schneier on Security | February 4, 2013 at 12:39 PM
Webpage says that it's "the most effective lightweight, portable anchor around."
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | February 1, 2013 at 10:40 PM
The Washington Post has the story:
The move, requested by the head of the Defense Department's Cyber Command, is part of an effort to turn an organization that...schneier From Schneier on Security | February 1, 2013 at 06:36 PM
Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...schneier From Schneier on Security | February 1, 2013 at 12:08 PM
Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard:
The ...schneier From Schneier on Security | January 31, 2013 at 07:28 PM
All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...schneier From Schneier on Security | January 31, 2013 at 01:09 PM
Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...schneier From Schneier on Security | January 30, 2013 at 06:20 PM
Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...schneier From Schneier on Security | January 30, 2013 at 12:51 PM
I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this:
Results showed...schneier From Schneier on Security | January 29, 2013 at 12:32 PM