From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's taken me a few years, but I've come around to this buzzword. It highlights an important characteristic of a particular sort of Internet attacker.
A conventional...schneier From Schneier on Security | November 9, 2011 at 07:51 PM
It's a crime with finesse:
But he is actually a middle-aged or older man who has been doing this for a very long time. And he is a fading breed.
"It's like a...schneier From Schneier on Security | November 7, 2011 at 06:43 PM
This sort of thing seems like a decent approach, but it has a lot of practical problems:
In the wake of Wikileaks, the Department of Defense has stepped up its...schneier From Schneier on Security | November 7, 2011 at 12:26 PM
Someone edited Star Trek IV, removing the whales and replacing them with giant squid.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | November 4, 2011 at 09:47 PM
From the Journal of Strategic Studies: "Cyber War Will Not Take Place" (full article is behind a paywall):
Abstract: For almost two decades, experts and defense...schneier From Schneier on Security | November 3, 2011 at 06:22 PM
Interesting research on how parents help their children lie about their age to get onto Facebook.
One reaction to our data might be that companies should not be...schneier From Schneier on Security | November 3, 2011 at 12:03 PM
I note that the three "industry leaders" speaking at the DARPA Cyber Colloquium next week have about 75 years of government experience between them.schneier From Schneier on Security | November 1, 2011 at 06:41 PM
I was not surprised that police forces are buying this system, but at its capabilities.
Britain's largest police force is operating covert surveillance technology...schneier From Schneier on Security | October 31, 2011 at 05:29 PM
This brazen tactic is from Malaysia. Robbers sabotage the machines, and then report the damage to the bank. When the banks send repair technicians to open and...schneier From Schneier on Security | October 31, 2011 at 01:18 PM
It's hard to tell if he likes it.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 28, 2011 at 09:25 PM
Brian Kerbs has done the analysis; it's something like 760 companies that were compromised.
Among the more interesting names on the list are Abbott Labs, the Alabama...schneier From Schneier on Security | October 28, 2011 at 08:21 PM
Neat:
Researchers have invented a new form of secret messaging using bacteria that make glowing proteins only under certain conditions. In addition to being useful...schneier From Schneier on Security | October 27, 2011 at 05:01 PM
EFF reports on the security of SSL:
The most interesting entry in that table is the "CA compromise" one, because those are incidents that could affect any or every...schneier From Schneier on Security | October 27, 2011 at 11:45 AM
I don't follow historical cryptography, so all of this comes as a surprise to me. But something called the Copiale Cipher from the 18th Century has been cracked...schneier From Schneier on Security | October 26, 2011 at 11:02 AM
Google releases statistics:
Google received more than 15,600 requests in the January-June period, 10 percent more than the final six months of last year. The requests...schneier From Schneier on Security | October 26, 2011 at 10:54 AM
I've been told that the Twofish encryption algorithm is mentioned in the book Abuse of Power, in the first paragraph of Chapter 3. Did rhe terrorists use it?...schneier From Schneier on Security | October 25, 2011 at 05:58 PM