From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
David Ropeik is a writer and consultant who specializes in risk perception and communication. His book, How Risky Is It, Really?: Why Our Fears Don't Always Match...schneier From Schneier on Security | August 2, 2010 at 09:20 AM
Selling fear:
The Vivos network, which offers partial ownerships similar to a timeshare in underground shelter communities, is one of several ventures touting...schneier From Schneier on Security | July 30, 2010 at 05:47 PM
Hacking ATMs to spit out money, demonstrated at the Black Hat conference:
The two systems he hacked on stage were made by Triton and Tranax. The Tranax hack was...schneier From Schneier on Security | July 30, 2010 at 01:55 PM
"Who controls the off switch?" by Ross Anderson and Shailendra Fuloria.
Abstract: We're about to acquire a significant new cybervulnerability. The world's energy...schneier From Schneier on Security | July 29, 2010 at 09:40 AM
The DNSSEC root key has been divided among seven people:
Part of ICANN's security scheme is the Domain Name System Security, a security protocol that ensures Web...schneier From Schneier on Security | July 28, 2010 at 04:12 PM
Okay, this is just weird:
Mark S. Price, a specialist in public security, and his privately held company, Paradise Lost Antiterrorism Network of America (www.plan...schneier From Schneier on Security | July 27, 2010 at 05:33 PM
It's a service:
The mechanism used involves captured network traffic, which is uploaded to the WPA Cracker service and subjected to an intensive brute force cracking...schneier From Schneier on Security | July 27, 2010 at 11:43 AM
An article from The Economist makes a point that I have been thinking about for a while: the modern technology makes life harder for spies, not easier. It used...schneier From Schneier on Security | July 26, 2010 at 11:12 AM
Where do these TV shows come from?
Follows the adventures of the Cuylers, an impoverished and dysfunctional family of anthropomorphic, air-breathing, redneck squids...schneier From Schneier on Security | July 23, 2010 at 09:19 PM
The Washington Post has published a phenomenal piece of investigative journalism: a long, detailed, and very interesting expose on the U.S. intelligence industry...schneier From Schneier on Security | July 23, 2010 at 05:46 PM
Stuxnet is a new Internet worm that specifically targets Siemens WinCC SCADA systems: used to control production at industrial plants such as oil rigs, refineries...schneier From Schneier on Security | July 23, 2010 at 01:59 PM
Interesting:
The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...schneier From Schneier on Security | July 22, 2010 at 11:41 AM
Two interesting research papers on website password policies.
"Where Do Security Policies Come From?":
Abstract: We examine the password policies of 75 different...schneier From Schneier on Security | July 20, 2010 at 06:52 PM
From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...schneier From Schneier on Security | July 20, 2010 at 11:43 AM
From Wired News:
The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...schneier From Schneier on Security | July 19, 2010 at 06:11 PM