From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...schneier From Schneier on Security | August 10, 2012 at 10:51 AM
This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals.
Unfortunately, the countermeasures all seem to be patent pending...schneier From Schneier on Security | August 9, 2012 at 11:32 AM
They were able to hack into government websites:
The gang’s USP, and the reason it could charge up to 10,000 yuan (£1,000) per certificate, was that it could hack...schneier From Schneier on Security | August 8, 2012 at 06:04 PM
A hacker can social-engineer his way into your cloud storageand delete everything you have.
It turns out, a billing address and the last four digits of a credit...schneier From Schneier on Security | August 8, 2012 at 11:31 AM
Ohio State University Law Professor Peter Swire testifies before Congress on the inadequacy of industry self-regulation to protect privacy.schneier From Schneier on Security | August 7, 2012 at 06:45 PM
Interesting article on using risk-limiting auditing in determining if an election's results are likely to be valid. The risk, in this case, is in the chance of...schneier From Schneier on Security | August 7, 2012 at 12:14 PM
Some things never change. Thirteen years ago, Mudge and I published a paper breaking Microsoft's PPTP protocol and the MS-CHAP authentication system. I haven't...schneier From Schneier on Security | August 6, 2012 at 04:22 PM
The Verified Voting Foundation has released a comprehensive state-by-state report on electronic voting machines (report, executive summary, and news coverage)....schneier From Schneier on Security | August 6, 2012 at 11:43 AM
It seems that quantum computers might use superconducting quantum interference devices (SQUIDs).
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | August 3, 2012 at 09:08 PM
In a long article about insecurities in gun safes, there's this great paragraph:
Unfortunately, manufacturers and consumers are deceived and misled into a false...schneier From Schneier on Security | August 3, 2012 at 05:57 PM
Horrific events, such as the massacre in Aurora, can be catalysts for social and political change. Sometimes it seems that they're the only catalyst; recall how...schneier From Schneier on Security | August 3, 2012 at 11:03 AM
Year ago, EPIC sued the TSA over full body scanners (I was one of the plantiffs), demanding that they follow their own rules and ask for public comment. The court...schneier From Schneier on Security | August 2, 2012 at 07:19 PM
The attack only works sometimes, but it does allow access to millions of hotel rooms worldwide that are secured by Onity brand locks. Basically, you can read the...schneier From Schneier on Security | August 2, 2012 at 06:08 PM
Wired has an interesting and comprehensive profile on Eugene Kaspersky. Especially note Kaspersky Lab's work to uncover US cyberespionage against Iran, Kaspersky's...schneier From Schneier on Security | August 2, 2012 at 11:23 AM
The new thing about the Aurora shooting wasn't the weaponry, but the armor:
What distinguished Holmes wasn't his offense. It was his defense. At Columbine, Harris...schneier From Schneier on Security | August 1, 2012 at 06:34 PM
We already know you can wear fake irises to fool a scanner into thinking you're not you, but this is the first fake iris you can use for impersonation: to fool...schneier From Schneier on Security | July 31, 2012 at 04:11 PM
This is impressive:
The device has Bluetooth and Wi-Fi adapters, a cellular connection, dual Ethernet ports, and hacking and remote access tools that let security...schneier From Schneier on Security | July 31, 2012 at 11:30 AM