From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting story about a con man who conned the U.S. government, and how the government is trying to hide its dealings with him.
For eight years, government officials...schneier From Schneier on Security | February 22, 2011 at 01:21 PM
Interesting:
Squid can hear, scientists have confirmed. But they don't detect the changes in pressure associated with sound waves, like we do. They have another...schneier From Schneier on Security | February 18, 2011 at 10:17 PM
Not an electronic wallet, a physical one:
Virtually indestructible, the dunhill Biometric Wallet will open only with touch of your fingerprint.
It can be linked...schneier From Schneier on Security | February 18, 2011 at 07:45 PM
NIST has just defined two new versions of SHA-512. They're SHA-512/224 and SHA-512/256: 224- and 256-bit truncations of SHA-512 with a new IV. They've done this...schneier From Schneier on Security | February 18, 2011 at 12:22 PM
Recently declassified: "Historical Study: The National Security Agency Scientific Advisory Board 1952schneier From Schneier on Security | February 17, 2011 at 02:38 PM
Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."
schneier From Schneier on Security | February 16, 2011 at 12:26 PM
Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.
He says the seven types...schneier From Schneier on Security | February 15, 2011 at 07:11 PM
Humans have a natural propensity to trust non-kin, even strangers. We do it so often, so naturally, that we don't even realize how remarkable it is. But except...schneier From Schneier on Security | February 15, 2011 at 11:43 AM
A newly discovered female squid pheromone sparks aggression in male squids. Article.
schneier From Schneier on Security | February 11, 2011 at 10:52 PM
From a blog post:
In my own area of study, the familiar trope of "balancing privacy and security" is a source of constant frustration to privacy advocates, because...schneier From Schneier on Security | February 11, 2011 at 06:48 PM
Design failure means you can pick winning tickets before scratching the coatings off. Most interesting is that there's statistical evidence that this sort of attack...schneier From Schneier on Security | February 10, 2011 at 12:42 PM
I was interviewed for this story on a mouse-powered explosives detector. Animal senses are better than any detection machine current technology can build, which...schneier From Schneier on Security | February 9, 2011 at 05:39 PM
I'd never heard the term "micromort" before. It's a probability: a one-in-a-million probability of death. For example, one-micromort activities are "travelling...schneier From Schneier on Security | February 8, 2011 at 11:46 AM
Scareware is fraudulent software that uses deceptive advertising to trick users into believing they're infected with some variety of malware, then convinces them...schneier From Schneier on Security | February 7, 2011 at 02:45 PM
Research from Japan: "Improvement of 'kurozukuri ika-shiokara' (fermented squid meat with ink) odor with Staphylococcus nepalensis isolated from the fish sauce...schneier From Schneier on Security | February 4, 2011 at 10:33 PM
A UK immigration officer decided to get rid of his wife by putting her on the no-fly list, ensuring that she could not return to the UK from abroad. This worked...schneier From Schneier on Security | February 4, 2011 at 07:35 PM
This makes sense.
Generally, militants prefer to attack soft targets where there are large groups of people, that are symbolic and recognizable around the world...schneier From Schneier on Security | February 4, 2011 at 12:00 PM