From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting:
Although the plot was disrupted before a particular airline was targeted and tickets were purchased, al Qaeda's continued attempts to attack the U...schneier From Schneier on Security | May 25, 2012 at 11:43 AM
A new study concludes that more people are worried about cyber threats than terrorism.
...the three highest priorities for Americans when it comes to security...schneier From Schneier on Security | May 24, 2012 at 04:31 PM
Interesting essay on a trove on surveillance photos from Cold War-era Prague.
Cops, even secret cops, are for the most part ordinary people. Working stiffs concerned...schneier From Schneier on Security | May 24, 2012 at 11:17 AM
Interesting discussion of trust in this article on web hoaxes.
Kelly's students, like all good con artists, built their stories out of small, compelling details...schneier From Schneier on Security | May 23, 2012 at 05:32 PM
Interesting paper: "The Perils of Social Reading," by Neil M. Richards, from the Georgetown Law Journal.
Abstract: Our law currently treats records of our reading...schneier From Schneier on Security | May 23, 2012 at 12:25 PM
"Roots of Racism," by Elizabeth Culotta in Science:
Our attitudes toward outgroups are part of a threat-detection system that allows us to rapidly determine friend...schneier From Schneier on Security | May 22, 2012 at 06:10 PM
Details are in the article, but here's the general idea:
Let's follow the flow of the users:
Scammer buys user traffic from PornoXo.com and sends it to HQTubeVideos...schneier From Schneier on Security | May 22, 2012 at 11:24 AM
Cheap!
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | May 18, 2012 at 09:26 PM
In his blog:
I think the most important security issues going forward center around identity and trust. Before knowing I would soon encounter Bruce again in the...schneier From Schneier on Security | May 18, 2012 at 11:06 AM
It was written in 1971, but this still seems like a cool book:
For an elementary illustration of tactics, take parts of your face as the point of reference; your...schneier From Schneier on Security | May 17, 2012 at 12:20 PM
Need some pre-industrial security for your USB drive? How about a wax seal? Neat, but I recommend combining it with encryption for even more security!schneier From Schneier on Security | May 16, 2012 at 06:50 PM
According to a report from the DHS Office of Inspector General:
Federal investigators "identified vulnerabilities in the screening process" at domestic airports...schneier From Schneier on Security | May 16, 2012 at 11:15 AM
To New Zealand:
United States Secretary of Homeland Security Janet Napolitano has warned the New Zealand Government about the latest terrorist threat known as...schneier From Schneier on Security | May 15, 2012 at 11:17 AM
Why do otherwise rational people think it's a good idea to profile people at airports? Recently, neuroscientist and best-selling author Sam Harris related a story...schneier From Schneier on Security | May 14, 2012 at 11:19 AM
Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid. And a review.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | May 11, 2012 at 09:58 PM
MobileScope looks like a great tool for monitoring and controlling what information third parties get from your smart phone apps:
We built MobileScope as a proof...schneier From Schneier on Security | May 11, 2012 at 11:42 AM
All RuggedCom equipment comes with a built-in backdoor:
The backdoor, which cannot be disabled, is found in all versions of the Rugged Operating System made by...schneier From Schneier on Security | May 9, 2012 at 11:24 AM