From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Really:
While the notion that a few animals produce polarization signals and use them in communication is not new, Mschneier From Schneier on Security | October 22, 2010 at 09:31 PM
Once a user has logged into FaceTime, anyone with access to the machine can change the user's Apple ID password without knowing the old password.
schneier From Schneier on Security | October 22, 2010 at 10:45 AM
Clever:
Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles...schneier From Schneier on Security | October 21, 2010 at 07:07 PM
I am the program chair for WEIS 2011, which is to be held next June in Washington, DC.
Submissions are due at the end of February.
Please forward and repost the...schneier From Schneier on Security | October 21, 2010 at 12:11 AM
This isn't good:
Intelligent Integration Systems (IISi), a small Boston-based software development firm, alleges that their Geospatial Toolkit and Extended SQL...schneier From Schneier on Security | October 20, 2010 at 12:21 PM
Ha!
When he's out and about near his Denver home, former Broncos quarterback John Elway has come up with a novel way to travel incognitoschneier From Schneier on Security | October 19, 2010 at 12:34 PM
This is clever:
The tool is called PinDr0p, and works by analysing the various characteristic noise artifacts left in audio by the different types of voice network...schneier From Schneier on Security | October 18, 2010 at 11:23 AM
India is writing its own operating system so it doesn't have to rely on Western technology:
India's Defence Research and Development Organisation (DRDO) wants...schneier From Schneier on Security | October 15, 2010 at 03:44 PM
Interesting new technology.
Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...schneier From Schneier on Security | October 14, 2010 at 05:10 PM
Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...schneier From Schneier on Security | October 14, 2010 at 11:35 AM
They're tracking a college student in Silicon Valley. He's 20, partially Egyptian, and studying marketing at Mission College. He found the tracking device attached...schneier From Schneier on Security | October 13, 2010 at 11:20 AM
Remember the Mahmoud al-Mabhouh assassination last January? The police identified 30 suspects, but haven't been able to find any of them.
Police spent about 10...schneier From Schneier on Security | October 12, 2010 at 11:12 AM
From Slate:
We do nothing, first and foremost, because there is nothing we can do. Unless the State Department gets specificschneier From Schneier on Security | October 8, 2010 at 05:49 PM
Sounds like it was easy:
Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer...schneier From Schneier on Security | October 8, 2010 at 11:23 AM
From the Journal of Homeland Security and Emergency Management: "Politics or Risks? An Analysis of Homeland Security Grant Allocations to the States."
Abstract...schneier From Schneier on Security | October 7, 2010 at 12:03 PM
Computer security experts are often surprised at which stories get picked up by the mainstream media. Sometimes it makes no sense. Why this particular data breach...schneier From Schneier on Security | October 7, 2010 at 10:16 AM
This will help some.
At least two rival systems plan to put unique codes on packages containing antimalarials and other medications. Buyers will be able to text...schneier From Schneier on Security | October 6, 2010 at 11:59 AM