From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...schneier From Schneier on Security | January 13, 2012 at 06:58 PM
It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...schneier From Schneier on Security | January 13, 2012 at 12:58 PM
I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...schneier From Schneier on Security | January 12, 2012 at 09:04 PM
The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.schneier From Schneier on Security | January 12, 2012 at 08:39 PM
Very interesting:
The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...schneier From Schneier on Security | January 12, 2012 at 06:37 PM
Apple has a patent on splitting a key between a portable device and its power supply.
Clever idea.schneier From Schneier on Security | January 12, 2012 at 11:53 AM
John Mueller has been collecting them:
Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...schneier From Schneier on Security | January 10, 2012 at 12:56 PM
Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...schneier From Schneier on Security | January 9, 2012 at 06:55 PM
Have you wondered what $1.2 billion in airport security gets you? The TSA has compiled its own "Top 10 Good Catches of 2011":
10) Snakes, turtles, and birds were...schneier From Schneier on Security | January 9, 2012 at 12:00 PM
It's a serious vulnerability. Note that this is the research that was mistakenly reported as allowing hackers to set your printer on fire.
Here's a list of all...schneier From Schneier on Security | January 6, 2012 at 07:50 PM
The author of this article notices that it's often easy to guess a cell phone PIN because of smudge marks on the screen. Those smudge marks indicate the four PIN...schneier From Schneier on Security | January 6, 2012 at 12:30 PM
The Liars and Outliers webpage is live. On it you can find links to order both paper and e-book copies from a variety of online retailers, and signed copies directly...schneier From Schneier on Security | January 5, 2012 at 07:39 PM
The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...schneier From Schneier on Security | January 4, 2012 at 02:37 PM
Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56schneier From Schneier on Security | January 2, 2012 at 06:33 PM
Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...schneier From Schneier on Security | January 2, 2012 at 12:15 PM
Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...schneier From Schneier on Security | December 30, 2011 at 12:11 PM
There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...schneier From Schneier on Security | December 29, 2011 at 07:58 PM