From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's coming to the iPhone and iPad, then to other platforms:
In SQUIDS, players will command a small army of stretchy, springy sea creatures to protect an idyllic...schneier From Schneier on Security | September 2, 2011 at 09:44 PM
This is an interesting article. The authors argue that the whole war-on-terror nonsense is useless -- that's not new -- but that the security establishment knows...schneier From Schneier on Security | September 2, 2011 at 06:34 PM
Fidelity National Information Services Inc. (FIS) lost $13M to an ATM theft earlier this year:
KrebsOnSecurity recently discovered previously undisclosed details...schneier From Schneier on Security | September 2, 2011 at 11:38 AM
It looks as if the entire mass of U.S. diplomatic cables that WikiLeaks had is available online somewhere. How this came about is a good illustration of how security...schneier From Schneier on Security | September 1, 2011 at 05:56 PM
There's been a forged Google certificate out in the wild for the past month and a half. Whoever has it -- evidence points to the Iranian government -- can, if...schneier From Schneier on Security | September 1, 2011 at 10:46 AM
This job can't be fun:
This Public Affairs Specialist position is located in the Office of Strategic Communications and Public Affairs (SCPA), Transportation Security...schneier From Schneier on Security | August 31, 2011 at 05:30 PM
Social networking sites make it very difficult, if not impossible, to have undercover police officers:
"The results found that 90 per cent of female officers were...schneier From Schneier on Security | August 31, 2011 at 12:21 PM
It's actually pretty good.
Also note that the site is redesigning its privacy. As we learned from Microsoft, nothing motivates a company to improve its security...schneier From Schneier on Security | August 30, 2011 at 05:24 PM
We finally have some, even though the company isn't talking:
So just how well crafted was the e-mail that got RSA hacked? Not very, judging by what F-Secure found...schneier From Schneier on Security | August 30, 2011 at 03:52 PM
It's hard to know how serious this really is:
The screenshots appear as B-roll footage in the documentary for six secondsschneier From Schneier on Security | August 29, 2011 at 11:20 AM
The industry is in decline:
A generation ago, most of the island's 10,000 residents worked in the squid industry, either as sellers like Kim or as farmer-fishermen...schneier From Schneier on Security | August 26, 2011 at 08:40 PM
This is a picture of a pair of wire cutters secured to a table with a wire.
Someone isn't thinking this through....schneier From Schneier on Security | August 26, 2011 at 08:07 PM
Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors:
The problem with threat inflation and misapplied history is that there...schneier From Schneier on Security | August 26, 2011 at 04:09 PM
John Mueller and his students analyze the 33 cases of attempted terrorism in the U.S. since 9/11. So few of them are actually real, and so many of them were created...schneier From Schneier on Security | August 26, 2011 at 11:26 AM
Nick Helm won an award for the funniest joke at the Edinburgh Fringe Festival:
Nick Helm: "I needed a password with eight characters so I picked Snow White and...schneier From Schneier on Security | August 25, 2011 at 09:08 PM
The security problems associated with moving $12B in gold from London to Venezuela.
It seems to me that Chschneier From Schneier on Security | August 25, 2011 at 05:43 PM
It's easy:
Researchers from UCSD pointed thermal cameras towards plastic ATM PIN pads and metal ATM PIN pads to test how effective they were at stealing PIN numbers...schneier From Schneier on Security | August 24, 2011 at 12:13 PM
Clever:
"When the user types on the soft keyboard on her smartphone (especially when she holds her phone by hand rather than placing it on a fixed surface), the...schneier From Schneier on Security | August 23, 2011 at 07:09 PM
Worried about someone hacking your implanted medical devices? Here's a signal-jamming device you can wear.schneier From Schneier on Security | August 23, 2011 at 11:56 AM