From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research: "Attacks and Design of Image Recognition CAPTCHAs."
Abstract. We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper...schneier From Schneier on Security | October 5, 2010 at 12:22 PM
I regularly say that security decisions are primarily made for non-security reasons. This article about the placement of sky marshals on airplanes is an excellent...schneier From Schneier on Security | October 4, 2010 at 06:55 PM
Not their online behavior at work, but their online behavior in life.
Using automation software that slogs through Facebook, Twitter, Flickr, YouTube, LinkedIn...schneier From Schneier on Security | October 4, 2010 at 11:31 AM
Okay, so this isn't a normal blog post.
It's not about security.
I've been playing doumbek with a band at the Minneapolis Renaissance Festival called Brother...schneier From Schneier on Security | October 1, 2010 at 07:43 PM
During the cyberwar debate a few months ago, I said this:
If we frame this discussion as a war discussion, then what you do when there's a threat of war is you...schneier From Schneier on Security | October 1, 2010 at 03:19 PM
This is a list of master's theses from the Naval Postgraduate School's Center for Homeland Defense and Security, this year.
Some interesting stuff in there....schneier From Schneier on Security | October 1, 2010 at 11:34 AM
On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet. Technologies...schneier From Schneier on Security | September 30, 2010 at 11:02 AM
Clever:
The burglars broke into their latest store near Paris and drilled a hole in the "pneumatic tube" that siphons money from the checkout to the strong-room...schneier From Schneier on Security | September 28, 2010 at 07:42 PM
This is no surprise:
The people behind the new study start by asking a pretty obvious question: "Why do members of the public disagreeschneier From Schneier on Security | September 28, 2010 at 11:33 AM
It's better to try to isolate parts of a terrorist network than to attempt to destroy it as a whole, at least according to this model:
Vos Fellman explains how...schneier From Schneier on Security | September 27, 2010 at 05:00 PM
It's serious:
The problem lies in the way that ASP.NET, Microsoft's popular Web framework, implements the AES encryption algorithm to protect the integrity ofdemo...schneier From Schneier on Security | September 27, 2010 at 11:51 AM
In an article about Robert Woodward's new book, Obama's Wars, this is listed as one of the book's "disclosures":
A new capability developed by the National Security...schneier From Schneier on Security | September 24, 2010 at 06:23 PM
Extremely persistent browser cookies:
evercookie is a javascript API available that produces extremely persistent cookies in a browser. Its goal is to identify...schneier From Schneier on Security | September 23, 2010 at 04:48 PM
From the AFP:
A publisher has agreed to remove US intelligence details from a memoir by a former army officer in Afghanistan after the Pentagon raised last-minute...schneier From Schneier on Security | September 23, 2010 at 12:19 PM
It's impressive:
The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged...schneier From Schneier on Security | September 22, 2010 at 11:25 AM
New attack:
Criminals across the UK have hacked the new keycard system used to top up pre-payment energy meters and are going door-to-door, dressed as power company...schneier From Schneier on Security | September 21, 2010 at 06:42 PM