From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's the kind of research result that screams hype, but online attacks that have physical-world consequences are fundamentally a different sort of threat. I suspect...schneier From Schneier on Security | December 2, 2011 at 07:17 PM
Interesting essay on walls and their effects:
Walls, then, are built not for security, but for a sense of security. The distinction is important, as those whoas...schneier From Schneier on Security | December 2, 2011 at 11:30 AM
According to researchers, full-disk encryption is hampering police forensics.
The authors of the report suggest there are some things law enforcement can do, but...schneier From Schneier on Security | December 1, 2011 at 07:44 PM
After a long and hard year, Liars and Outliers is done. I submitted the manuscript to the publisher on Oct 1, got edits back from both an outside editor and a...schneier From Schneier on Security | December 1, 2011 at 12:25 PM
The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology:
The virus...schneier From Schneier on Security | November 30, 2011 at 06:28 PM
I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied:
But others inside the American intelligence...schneier From Schneier on Security | November 30, 2011 at 12:57 PM
If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world:
Maize plants, like many others, protect themselves...schneier From Schneier on Security | November 29, 2011 at 08:13 PM
Electronic surveillance is becoming so easy that even marketers can do it:
The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd...schneier From Schneier on Security | November 29, 2011 at 01:01 PM
Shichang Zhang, Teck Hui Koh, Wee Khee Seah, Yee Hing Lai, Mark A. Elgar, and Daiqin Li (2011), "A Novel Property of Spider Silk: Chemical Defence Against Ants,"...schneier From Schneier on Security | November 28, 2011 at 06:55 PM
There was an interdisciplinary cephalopod art conference earlier this year, in Minneapolis. Videos of the conference are available online.
As usual, you can also...schneier From Schneier on Security | November 25, 2011 at 10:27 PM
The Android platform is where the malware action is:
What happens when anyone can develop and publish an application to the Android Market? A 472% increase ingain...schneier From Schneier on Security | November 25, 2011 at 12:06 PM
Dan Boheh of Stanford University is teaching a free cryptography class starting in January.schneier From Schneier on Security | November 22, 2011 at 11:59 AM
A hack against a SCADA system controlling a water pump in Illinois destroyed the pump.
We know absolutely nothing here about the attack or the attacker's motivations...schneier From Schneier on Security | November 21, 2011 at 12:57 PM
Some squid can switch their camouflage instantly.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | November 18, 2011 at 10:41 PM
I write a lot about altruism, fairness, and cooperation in my new book (out in February!), and this sort of thing interests me a lot:
In a new study, researchers...schneier From Schneier on Security | November 18, 2011 at 11:50 AM
The European Union has banned X-ray full body scanners at airports. Millimeter wave scanners are allowed as long as they conform to privacy guidelines.
UnderArticle...schneier From Schneier on Security | November 17, 2011 at 07:13 PM
Interesting:
The researchers interviewed 52 convicted murderers, 14 of them ranked as psychopaths according to the Psychopathy Checklist-Revised, a 20-item assessment...schneier From Schneier on Security | November 17, 2011 at 12:37 PM
Really nice article on crypotographer Paul Kocher and his company, Cryptography Research, Inc. schneier From Schneier on Security | November 16, 2011 at 10:45 PM
I thought this was very interesting. His three principles are:
Avoid dangerous people and dangerous places.
Do not defend your property.
Respond immediately and...schneier From Schneier on Security | November 16, 2011 at 03:17 PM