From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The second document in this file is the recently unclassified "Guide to Historical Cryptologic Acronyms and Abbreviations, 1940-1980," from the NSA
Note that there...schneier From Schneier on Security | October 25, 2011 at 10:31 AM
It's illegal for Blue Coat to sell its technology for this purpose, but there are lots of third-parties who are willing to act as middlemen:
"Blue Coat does not...schneier From Schneier on Security | October 24, 2011 at 06:39 PM
Patent number 2,011,023,240:
Communicating Information in a Social Network System about Activities from Another Domain
Abstract: In one embodiment, a method...schneier From Schneier on Security | October 24, 2011 at 11:42 AM
Interesting analysis:
the hacktivist group Anonymous hacked into several BART servers. They leaked part of a database of users from myBART, a website which provides...schneier From Schneier on Security | October 20, 2011 at 11:25 AM
A newly discovered piece of malware, Duqu, seems to be a precursor to the next Stuxnet-like worm and uses some of the same techniques as the original.schneier From Schneier on Security | October 19, 2011 at 04:05 PM
Things are getting interesting in Europe:
Max is a 24 year old law student from Vienna with a flair for the interview and plenty of smarts about both technology...schneier From Schneier on Security | October 18, 2011 at 11:34 AM
There's big news in the world of giant squid:
Researchers initially thought that this strange grouping of 45-foot-long marine reptiles had either died en masse...schneier From Schneier on Security | October 14, 2011 at 09:07 PM
I find this fascinating:
A central California man has been arrested for possession of child pornography, thanks to a tip from burglars who robbed the man's property...schneier From Schneier on Security | October 14, 2011 at 05:34 PM
The Chaos Computer Club has disassembled and analyzed the Trojan used by the German police for legal intercept. In its default mode, it takes regular screenshots...schneier From Schneier on Security | October 13, 2011 at 11:03 AM
Nice research:
Abstract: We report a novel attack on two CAPTCHAs that have been widely deployed on the Internet, one being Google's home design and the other...schneier From Schneier on Security | October 12, 2011 at 11:57 AM
You'd think we would be more careful than this:
A computer virus has infected the cockpits of Americaschneier From Schneier on Security | October 10, 2011 at 11:38 AM
Humboldt squid are washing up on beaches across Southern California. Seems like it's no big deal; the squid just swam too close to shore.schneier From Schneier on Security | October 7, 2011 at 09:51 PM
Related to this blog post from Wednesday, here's a paper that looks at security seals on voting machines.
Andrew W. Appel, "Security Seals on Voting Machines:...schneier From Schneier on Security | October 7, 2011 at 06:11 PM
From a review of Susan Landau's Surveillance or Security?:
To catch up with the new technologies of malfeasance, FBI director Robert Mueller traveled to Silicon...schneier From Schneier on Security | October 7, 2011 at 11:01 AM
Last weekend, I completely reframed the book. I realized that the book isn't about security. It's about trust. I'm writing about how society induces people to...schneier From Schneier on Security | October 6, 2011 at 12:38 AM