From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...schneier From Schneier on Security | June 9, 2011 at 06:53 PM
I have no idea if this is true:
In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...schneier From Schneier on Security | June 8, 2011 at 08:46 PM
Here's a new law that won't work:
State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...schneier From Schneier on Security | June 7, 2011 at 10:32 AM
MI6 hacked into an online al-Qaeda magazine and replaced bomb-making instructions with a cupcake recipe.
It's a more polite hack than subtly altering the recipe...schneier From Schneier on Security | June 6, 2011 at 07:59 PM
Redaction failures are so common that I stopped blogging about them years ago. This is the first analysis I have seen of technical redaction failures. And here's...schneier From Schneier on Security | June 6, 2011 at 12:06 PM
Neat:
The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team...schneier From Schneier on Security | June 3, 2011 at 06:49 PM
At first glance, this seems like a particularly dumb opening line of an article:
Open-source software may not sound compatible with the idea of strong cybersecurity...schneier From Schneier on Security | June 2, 2011 at 05:11 PM
Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...schneier From Schneier on Security | June 2, 2011 at 02:48 PM
In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...schneier From Schneier on Security | June 2, 2011 at 12:32 PM
CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....schneier From Schneier on Security | June 1, 2011 at 01:59 PM
That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...schneier From Schneier on Security | May 31, 2011 at 06:12 PM
In my latest book (available February), I talk about various mechanisms for societal security: how we as a group protect ourselves from the "dishonest minority"...schneier From Schneier on Security | May 31, 2011 at 11:34 AM
Cyber criminals are getting aggressive with their social engineering tactics.
Val Christopherson said she received a telephone call last Tuesday from a man stating...schneier From Schneier on Security | May 30, 2011 at 11:58 AM
All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...schneier From Schneier on Security | May 27, 2011 at 11:04 AM
It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...schneier From Schneier on Security | May 26, 2011 at 06:57 PM