From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The small San Francisco film and video company is celebrating its 17th anniversary.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | December 21, 2012 at 10:58 PM
Schools go into lockdown over a thermometer, a car backfiring, a bank robbery a few blocks away, a student alone in a gym, a neighbor on the street, and some vague...schneier From Schneier on Security | December 21, 2012 at 06:12 PM
Clever:
Chris Cardinal discovered someone running such a scam on Amazon using his account: the scammer contacted Amazon pretending to be Chris, supplying his billing...schneier From Schneier on Security | December 21, 2012 at 12:20 PM
The "Great Firewall of China" is now able to detect and block encryption:
A number of companies providing "virtual private network" (VPN) services to users in...schneier From Schneier on Security | December 20, 2012 at 12:32 PM
This is an interesting blog post:
Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one canHere's...schneier From Schneier on Security | December 19, 2012 at 12:47 PM
There's a new exploit against Samsung Galaxy phones that allows a rogue app access to all memory. A hacker could copy all of your data, erase all of your data,...schneier From Schneier on Security | December 18, 2012 at 12:38 PM
A Canadian claims that the message is based on a WWI codebook. A spokesman from GCHQ remains dubious, but says they'll be happy to look at the proposed solution...schneier From Schneier on Security | December 17, 2012 at 06:39 PM
Neat art project. Another link.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 14, 2012 at 10:44 PM
Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, by Harvey Molotch, Princeton University Press, 278 pages, $35
Security...schneier From Schneier on Security | December 14, 2012 at 06:24 PM
There's a rise in QR codes that point to fraudulent sites. One of the warning signs seems to be a sticker with the code, rather than a code embedded in an advertising...schneier From Schneier on Security | December 13, 2012 at 12:19 PM
Interesting development in forensic analysis:
Comparing the unique pattern of the frequencies on an audio recording with a database that has been logging these...schneier From Schneier on Security | December 12, 2012 at 06:59 PM
This book is available as a free pdf download:
The National Cyber Security Framework Manual provides detailed background information and in-depth theoretical frameworks...schneier From Schneier on Security | December 11, 2012 at 07:03 PM
Excellent article: "How to Shut Down Internets."
First, he describes what just happened in Syria. Then:
Egypt turned off the internet by using the Border Gateway...schneier From Schneier on Security | December 11, 2012 at 12:08 PM
Yet another way two-factor authentication has been bypassed:
For a user to fall prey to Eurograbber, he or she must first be using a computer infected with the...schneier From Schneier on Security | December 10, 2012 at 07:04 PM
Four squids on the cover of this week's Economist represent the four massive (and intrusive) data-driven Internet giants: Google, Facebook, Apple, and Amazon.
Interestingly...schneier From Schneier on Security | December 7, 2012 at 10:04 PM
Not the sort of pairing I normally think of, but:
Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh...schneier From Schneier on Security | December 6, 2012 at 04:59 PM