From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good comment:
"We're moving into an era of 'steal everything'," said David Emm, a senior security researcher for Kaspersky Labs.
He believes that cyber criminals...schneier From Schneier on Security | May 10, 2011 at 11:20 AM
This hack was conducted as a research project. It's unlikely it's being done in the wild:
In one attack, Wang and colleagues used a plug-in for the Firefox web...schneier From Schneier on Security | May 9, 2011 at 06:50 PM
Three months ago, I announced that I was writing a book on why security exists in human societies. This is basically the book's thesis statement:
All complex...schneier From Schneier on Security | May 9, 2011 at 12:02 PM
A scary development in rootkits:
Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...schneier From Schneier on Security | May 6, 2011 at 05:32 PM
Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.
schneier From Schneier on Security | May 6, 2011 at 12:01 PM
Exactly how did they confirm it was Bin Laden's body?
Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...schneier From Schneier on Security | May 5, 2011 at 05:52 PM
It's not that the risk is greater, it's that the fear is greater. Data from New York:
There were 10,566 reports of suspicious objects across the five boroughs...schneier From Schneier on Security | May 5, 2011 at 11:43 AM
Wouldn't it be great if this were not a joke: the security contingency that was in place in the event that Kate Middleton tried to run away just before the wedding...schneier From Schneier on Security | May 4, 2011 at 05:15 PM
This is interesting:
When World Kitchen took over the Pyrex brand, it started making more products out of prestressed soda-lime glass instead of borosilicate....schneier From Schneier on Security | May 4, 2011 at 11:40 AM
According to this article, students are no longer learning how to write in cursive. And, if they are learning it, they're forgetting how. Certainly the ubiquity...schneier From Schneier on Security | May 3, 2011 at 07:25 PM
Not a lot of details:
ElcomSoft research shows that image metadata and image data are processed independently with a SHA-1 hash function. There are two 160-bit...schneier From Schneier on Security | May 3, 2011 at 12:54 PM
Earlier this month, the FBI seized control of the Coreflood botnet and shut it down:
According to the filing, ISC, under law enforcement supervision, planned to...schneier From Schneier on Security | May 2, 2011 at 10:30 AM
This is a surprise. My TED talk made it to the website. It's a surprise because I didn't speak at TED. I spoke last year at a regional TED event, TEDxPSU. And...schneier From Schneier on Security | April 29, 2011 at 07:45 PM
Good paper: "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," by Jerry Brito and Tate Watkins.
Over the past two years there has...schneier From Schneier on Security | April 28, 2011 at 11:56 AM
It's standard sociological theory that a group experiences social solidarity in response to external conflict. This paper studies the phenomenon in the Unitednew...schneier From Schneier on Security | April 27, 2011 at 02:10 PM
As I've written before, I run an open WiFi network. It's stories like these that may make me rethink that.
The three stories all fall along the same theme: a...schneier From Schneier on Security | April 26, 2011 at 11:59 AM