From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is both news and not news:
Indeed, the Argonne team's attack required no modification, reprogramming, or even knowledge, of the voting machine's proprietary...schneier From Schneier on Security | October 5, 2011 at 11:58 AM
October is National Cybersecurity Awareness Month, sponsored by the Department of Homeland Security. The website has some sample things you can do to to celebrate...schneier From Schneier on Security | October 4, 2011 at 11:31 AM
A great find:
In his 1956 short story, "Let's Get Together," Isaac Asimov describes security measures proposed to counter a terrorist threat:
"Consider further...schneier From Schneier on Security | October 3, 2011 at 06:20 PM
Custom HTC firmware breaks standard permissions and allows rogue apps to access location, address book, and account info without authorization.schneier From Schneier on Security | October 3, 2011 at 11:35 AM
An analysis of extensions to the Chrome browser shows that 25% of them are insecure:
We reviewed 100 Chrome extensions and found that 27 of the 100 extensions...schneier From Schneier on Security | September 29, 2011 at 11:59 AM
Iran blocks Tor, and Tor releases a workaround on the same day.
How did the filter work technically? Tor tries to make its traffic look like a web browser talking...schneier From Schneier on Security | September 26, 2011 at 09:31 AM
There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female.
This unusual behaviour, they...schneier From Schneier on Security | September 23, 2011 at 09:28 PM
It's the Browser Exploit Against SSL/TLS Tool, or BEAST:
The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...schneier From Schneier on Security | September 23, 2011 at 06:37 PM
On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...schneier From Schneier on Security | September 23, 2011 at 11:17 AM
This proposal is worth thinking about.
Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...schneier From Schneier on Security | September 23, 2011 at 10:22 AM
The long-standing ANZUS military treaty now includes cyberspace attacks:
According to Reuters, the decision was made in discussions between the two countries this...schneier From Schneier on Security | September 22, 2011 at 12:09 PM
Risks of teen driving:
For more than a decade, California and other states have kept their newest teen drivers on a tight leash, restricting the hours when they...schneier From Schneier on Security | September 21, 2011 at 11:58 AM
The interesting thing about this attack is how it abuses a variety of different security systems.
Investigations revealed that the syndicate members had managed...schneier From Schneier on Security | September 20, 2011 at 11:36 AM
As you'd expect, it's not very good:
But this measure [Turnitin] captures only the most flagrant form of plagiarism, where passages are copied from one document...schneier From Schneier on Security | September 19, 2011 at 11:35 AM