From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A scary development in rootkits:
Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...schneier From Schneier on Security | May 6, 2011 at 05:32 PM
Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.
schneier From Schneier on Security | May 6, 2011 at 12:01 PM
Exactly how did they confirm it was Bin Laden's body?
Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...schneier From Schneier on Security | May 5, 2011 at 05:52 PM
It's not that the risk is greater, it's that the fear is greater. Data from New York:
There were 10,566 reports of suspicious objects across the five boroughs...schneier From Schneier on Security | May 5, 2011 at 11:43 AM
Wouldn't it be great if this were not a joke: the security contingency that was in place in the event that Kate Middleton tried to run away just before the wedding...schneier From Schneier on Security | May 4, 2011 at 05:15 PM
This is interesting:
When World Kitchen took over the Pyrex brand, it started making more products out of prestressed soda-lime glass instead of borosilicate....schneier From Schneier on Security | May 4, 2011 at 11:40 AM
According to this article, students are no longer learning how to write in cursive. And, if they are learning it, they're forgetting how. Certainly the ubiquity...schneier From Schneier on Security | May 3, 2011 at 07:25 PM
Not a lot of details:
ElcomSoft research shows that image metadata and image data are processed independently with a SHA-1 hash function. There are two 160-bit...schneier From Schneier on Security | May 3, 2011 at 12:54 PM
Earlier this month, the FBI seized control of the Coreflood botnet and shut it down:
According to the filing, ISC, under law enforcement supervision, planned to...schneier From Schneier on Security | May 2, 2011 at 10:30 AM
This is a surprise. My TED talk made it to the website. It's a surprise because I didn't speak at TED. I spoke last year at a regional TED event, TEDxPSU. And...schneier From Schneier on Security | April 29, 2011 at 07:45 PM
Good paper: "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," by Jerry Brito and Tate Watkins.
Over the past two years there has...schneier From Schneier on Security | April 28, 2011 at 11:56 AM
It's standard sociological theory that a group experiences social solidarity in response to external conflict. This paper studies the phenomenon in the Unitednew...schneier From Schneier on Security | April 27, 2011 at 02:10 PM
As I've written before, I run an open WiFi network. It's stories like these that may make me rethink that.
The three stories all fall along the same theme: a...schneier From Schneier on Security | April 26, 2011 at 11:59 AM
Clever:
Khan and his colleagues have written software that ensures clusters of a file, rather than being positioned at the whim of the disc drive controller chip...schneier From Schneier on Security | April 25, 2011 at 10:24 AM
Okay, this is a little weird:
This year's Earth Day will again include the celebrated "squid printing" activity with two big, beautiful Pacific Humboldt squidagain...schneier From Schneier on Security | April 22, 2011 at 09:30 PM
The CIA has just declassified six (1, 2, 3, 4, 5, and 6) documents about World War I security techniques. (The media is reporting they're CIA documents, but the...schneier From Schneier on Security | April 21, 2011 at 11:38 AM