From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The security connection is pretty tenuous, so I figured I'd blog this on a Saturday.
Once it infects an ant, the fungus uses as-yet-unidentified chemicals to control...schneier From Schneier on Security | March 19, 2011 at 02:12 PM
Clever hack:
The thieves glue down the "enter," "cancel" and "clear" buttons on the keypad and wait until the customer goes into the bank for help before withdrawing...schneier From Schneier on Security | March 17, 2011 at 11:50 AM
Impressive research:
By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car's stereo...schneier From Schneier on Security | March 16, 2011 at 11:14 AM
Interesting research. It only works when there's a limited number of potential authors:
To test the accuracy of their technique, Fung and his colleagues examined...schneier From Schneier on Security | March 14, 2011 at 09:46 AM
This three-part video interview with me was conducted at the RSA Conference last month.
schneier From Schneier on Security | March 11, 2011 at 07:11 PM
Last month I posted Susan Landau's testimony before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security on government eavesdropping...schneier From Schneier on Security | March 11, 2011 at 12:06 PM
A programmer installed malware into the Whack-a-Mole arcade game as a form of job security.
It didn't work.
schneier From Schneier on Security | March 9, 2011 at 12:38 PM
It's a clever hack, but an old problem: the authentication in these sorts of normal operations isn't good enough to prevent abuse.
schneier From Schneier on Security | March 8, 2011 at 12:35 PM
"American Cryptography During the Cold War 1945-1989; Book IV: Cryptologic Rebirth 1981-1989." Document was first declassified in 2009. Here are some newly declassified...schneier From Schneier on Security | March 7, 2011 at 12:47 PM
Fascinating research summarized in The Economist. Basically, detecting dogs respond to unconscious cues from their handlers, and generate false alarms becausebomb...schneier From Schneier on Security | March 4, 2011 at 01:07 PM
Pickpockets in America are dying out. This is the bit I found interesting:
And perhaps most important, the centuries-old apprenticeship system underpinning organized...schneier From Schneier on Security | March 3, 2011 at 12:35 PM
"Reliably Erasing Data From Flash-Based Solid State Drives," by Michael Wei, Laura M. Grupp, Frederick E. Spada, and Steven Swanson.
Abstract: Reliably erasing...schneier From Schneier on Security | March 1, 2011 at 12:29 PM
One of the effects of writing a book is that I don't have the time to devote to other writing. So while I've been wanting to write about Anonymous vs HBGary, I...schneier From Schneier on Security | February 28, 2011 at 09:13 AM
This is a really good piece by Paul Roberts on Anonymous vs. HBGary: not the tactics or the politics, but what HBGary demonstrates about the IT security industry...schneier From Schneier on Security | February 25, 2011 at 12:14 PM
From Reason:
Know thy enemy is an ancient principle of warfare. And if America had
heeded it, it might have refrained from a full-scale "war" on terrorism whose...schneier From Schneier on Security | February 24, 2011 at 12:44 PM