From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New paper: "Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise":
Current aviation...schneier From Schneier on Security | June 20, 2011 at 12:01 PM
I'm at SHB 2011, the fourth Interdisciplinary Workshop on Security and Human Behavior, at Carnegie Mellon University. This is a two-day invitational gathering of...schneier From Schneier on Security | June 18, 2011 at 06:06 PM
One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...schneier From Schneier on Security | June 17, 2011 at 05:09 PM
I'm at the Tenth Workshop on Economics of Information Security (WEIS 2011) , at George Mason University. Most of the papers are online, and Ross Anderson is liveblogging...schneier From Schneier on Security | June 15, 2011 at 06:19 PM
Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...schneier From Schneier on Security | June 14, 2011 at 06:45 PM
Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...schneier From Schneier on Security | June 14, 2011 at 12:54 PM
I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...schneier From Schneier on Security | June 13, 2011 at 11:52 AM
Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.
schneier From Schneier on Security | June 10, 2011 at 05:59 PM
Interesting:
Iscon's patented, thermo-conductive technology combines infrared (IR) and heat transfer, for high-resolution imaging without using any radiation....schneier From Schneier on Security | June 10, 2011 at 11:14 AM
Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...schneier From Schneier on Security | June 9, 2011 at 06:53 PM
I have no idea if this is true:
In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...schneier From Schneier on Security | June 8, 2011 at 08:46 PM
Here's a new law that won't work:
State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...schneier From Schneier on Security | June 7, 2011 at 10:32 AM