From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A great story:
Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...schneier From Schneier on Security | December 29, 2011 at 03:47 PM
Here's a new biometric: how you sit:
...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...schneier From Schneier on Security | December 28, 2011 at 05:40 PM
Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.schneier From Schneier on Security | December 27, 2011 at 12:22 PM
Cupcakes deemed security threat:
Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...schneier From Schneier on Security | December 25, 2011 at 04:28 PM
It's a metaphor that will not die.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 24, 2011 at 12:10 AM
In 1997, I wrote about something called a chosen-protocol attack, where an attacker can use one protocol to break another. Here's an example of the same thing...schneier From Schneier on Security | December 20, 2011 at 12:24 PM
This could be interesting:
NOtES exploits an obscure area of physics to accomplish its bright and sharp display, known as plasmonics. Light waves interact with...schneier From Schneier on Security | December 19, 2011 at 12:48 PM
It's squid season off the coast of Southern California.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't...schneier From Schneier on Security | December 16, 2011 at 10:24 PM
In 1997, I spoke at the Beyond HOPE Conference in New York. (HOPE stood for "Hackers Over Planet Earth.) A video of that talk is available online.schneier From Schneier on Security | December 16, 2011 at 08:52 PM
At the 1:46 mark, you'll see my first cameo appearance in a transvestite-themed rock video.schneier From Schneier on Security | December 16, 2011 at 07:28 PM
There's a report that Iran hacked the drones' GPS systems:
"The GPS navigation is the weakest point," the Iranian engineer told the Monitor, giving the most detailed...schneier From Schneier on Security | December 16, 2011 at 06:01 PM
When you give out money based on politics, without any accounting, this is what you get:
The West Michigan Shoreline Regional Development Commission (WMSRDC) is...schneier From Schneier on Security | December 16, 2011 at 05:21 PM
This is a really good analysis about the Buckshot Yankee attack against the classified military computer network in 2008. It contains a bunch of details I had...schneier From Schneier on Security | December 15, 2011 at 06:50 PM
My publisher is printing galley copies of Liars and Outliers. If anyone out there has a legitimate reason to get one, like writing book reviews for a newspaper...schneier From Schneier on Security | December 15, 2011 at 05:00 AM
Sparrows have fewer surviving offspring if they feel insecure, regardless of whether they actually are insecure. Liana Y. Zanette, Aija F. White, Marek C. Allen...schneier From Schneier on Security | December 14, 2011 at 07:22 PM
Al Qaeda is sewing bombs into people. Actually, not really. This is an "aspirational" terrorist threat, which basically means that someone mentioned it whilelot...schneier From Schneier on Security | December 14, 2011 at 12:17 PM