From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Well, new to us:
You see, an EMV payment card authenticates itself with a MAC of transaction data, for which the freshly generated component is the unpredictable...schneier From Schneier on Security | September 11, 2012 at 02:35 PM
There's a lot:
Advance tickets are required to enter this public, outdoor memorial. To book them, you’re obliged to provide your home address, email address, and...schneier From Schneier on Security | September 11, 2012 at 11:45 AM
Larry Constantine disputes David Stanger's book about Stuxnet:
So, what did he get wrong? First of all, the Stuxnet worm did not escape into the wild. The analysis...schneier From Schneier on Security | September 10, 2012 at 11:51 AM
Wacky. Other stories about the story.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 7, 2012 at 09:41 PM
Truly bizarre story of someone who seems to have figured out how to successfully cheat at marathons. The evidence of his cheating is overwhelming, but no one knows...schneier From Schneier on Security | September 7, 2012 at 12:10 PM
I'm trying to separate cloud security hype from reality. To that end, I'd like to talk to a few big corporate CSOs or CISOs about their cloud security worries,...schneier From Schneier on Security | September 6, 2012 at 05:31 PM
In this story, we learn that hackers got their hands on a database of 12 million Apple Apple Unique Device Identifiers (UDIDs) by hacking an FBI laptop.
When I...schneier From Schneier on Security | September 6, 2012 at 11:48 AM
Liars and Outliers (along with two other books: Kip Hawley's memoir of his time at the TSA and Against Security, by Harvey Molotch) has been reviewed in the Wall...schneier From Schneier on Security | September 5, 2012 at 07:04 PM
In this fascinating piece of research, the question is asked: can we surreptitiously collect secret information from the brains of people using brain-computer interface...schneier From Schneier on Security | September 5, 2012 at 11:06 AM
Yet another biometric: eye twitch patterns:
...a person's saccades, their tiny, but rapid, involuntary eye movements, can be measured using a video camera. The...schneier From Schneier on Security | September 4, 2012 at 02:04 PM
A fable.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 31, 2012 at 09:22 PM
I'm on The WELL right now -- for the next week or so -- discussing my new book with anyone who wants to participate.
I'm also at Dragon*Con this weekend in Atlanta...schneier From Schneier on Security | August 31, 2012 at 02:20 PM
Shelly C. McArdle, Heather Rosoff, Richard S. John (2012), "The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal...schneier From Schneier on Security | August 30, 2012 at 02:22 PM
A reader sent me this photo of a shared lock. It's at the gate of a large ranch outside of Victoria, Texas. Multiple padlocks secure the device, but when a single...schneier From Schneier on Security | August 29, 2012 at 11:37 AM
In May, neuroscientist and popular author Sam Harris and I debated the issue of profiling Muslims at airport security. We each wrote essays, then went back and...schneier From Schneier on Security | August 28, 2012 at 03:38 PM
The squid Octopoteuthis deletron will drop portions of an arm to escape from a predator.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | August 24, 2012 at 09:32 PM
A surprisingly sensible list.
E. Why are you penalizing the 95% for the 5%? You don't do this in other areas of discipline at school. Even though you know some...schneier From Schneier on Security | August 24, 2012 at 06:18 PM
Nice post:
The screaming fear in your stomach before you give a speech to 12 kids in the fifth grade is precisely the same fear a presidential candidate feels...schneier From Schneier on Security | August 24, 2012 at 11:27 AM
Finally, someone takes a look at the $1 trillion number government officials are quoting as the cost of cybercrime. While it's a good figure to scare people, it...schneier From Schneier on Security | August 23, 2012 at 06:23 PM