From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The whole article is interesting, but here's just one bit:
The favoured quick-fix money-making exercise of the average Irish organised crime gang had, for decades...schneier From Schneier on Security | July 8, 2011 at 11:19 AM
A really interesting article:
Al Qaeda played all out, spent all its assets in a few years. In my dumb-ass 2005 article, I called the Al Qaeda method "real war"...schneier From Schneier on Security | July 7, 2011 at 11:36 AM
Last week, I got a bunch of press calls about Olajide Oluwaseun Noibi, who flew from New York to Los Angeles using an expired ticket in someone else's name andmakes...schneier From Schneier on Security | July 6, 2011 at 10:53 AM
There's a new version:
The latest TDL-4 version of the rootkit, which is used as a persistent backdoor to install other types of malware, infected 4.52 million...schneier From Schneier on Security | July 1, 2011 at 05:08 PM
This is a really weird story:
After setting up its own cyber-warfare team, China's military has now developed its first online war game aimed at improving combat...schneier From Schneier on Security | June 30, 2011 at 01:15 PM
I'm really getting tired of stories like this:
Computer disks and USB sticks were dropped in parking lots of government buildings and private contractors, andcourse...schneier From Schneier on Security | June 29, 2011 at 02:13 PM
There's some great data on common iPhone passwords. I'm sure the results also apply to banking PINs.schneier From Schneier on Security | June 27, 2011 at 11:15 AM
Here's someone who is selling positive feedback on eBay:
Hello, for sale is a picture of a tree. This tree is an original and was taken by me. I have gotten...schneier From Schneier on Security | June 24, 2011 at 06:59 PM
It's a new world:
An armed Valdez, 36, held a woman hostage at a motel in a tense 16-hour, overnight standoff with SWAT teams, all while finding time to keep his...schneier From Schneier on Security | June 24, 2011 at 04:40 PM
AppFence is a technology -- with a working prototype -- that protects personal information on smart phones. It does this by either substituting innocuous information...schneier From Schneier on Security | June 24, 2011 at 11:37 AM
Protecting against insiders is hard.
Kluger and two accomplices -- a Wall Street trader and a mortgage broker -- allegedly stole and traded on material nonpublic...schneier From Schneier on Security | June 23, 2011 at 11:29 AM
Many of our informal security systems involve convincing others to do what we want them to. Here's a theory that says human reasoning evolved not as a tool tohere...schneier From Schneier on Security | June 22, 2011 at 06:40 PM
As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...schneier From Schneier on Security | June 21, 2011 at 04:20 PM
Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research.
Abstract: Much of the information we have on cyber-crime...schneier From Schneier on Security | June 21, 2011 at 10:58 AM