From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Many of our informal security systems involve convincing others to do what we want them to. Here's a theory that says human reasoning evolved not as a tool tohere...schneier From Schneier on Security | June 22, 2011 at 06:40 PM
As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...schneier From Schneier on Security | June 21, 2011 at 04:20 PM
Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research.
Abstract: Much of the information we have on cyber-crime...schneier From Schneier on Security | June 21, 2011 at 10:58 AM
New paper: "Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise":
Current aviation...schneier From Schneier on Security | June 20, 2011 at 12:01 PM
I'm at SHB 2011, the fourth Interdisciplinary Workshop on Security and Human Behavior, at Carnegie Mellon University. This is a two-day invitational gathering of...schneier From Schneier on Security | June 18, 2011 at 06:06 PM
One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...schneier From Schneier on Security | June 17, 2011 at 05:09 PM
I'm at the Tenth Workshop on Economics of Information Security (WEIS 2011) , at George Mason University. Most of the papers are online, and Ross Anderson is liveblogging...schneier From Schneier on Security | June 15, 2011 at 06:19 PM
Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...schneier From Schneier on Security | June 14, 2011 at 06:45 PM
Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...schneier From Schneier on Security | June 14, 2011 at 12:54 PM
I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...schneier From Schneier on Security | June 13, 2011 at 11:52 AM
Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.
schneier From Schneier on Security | June 10, 2011 at 05:59 PM