From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is from Atomic Bombing: How to Protect Yourself, published in 1950:
Of course, millions of us will go through our lives never seeing a spy or a saboteur...schneier From Schneier on Security | July 1, 2010 at 06:05 PM
By Russian spies:
Ricci said the steganographic program was activated by pressing control-alt-E and then typing in a 27-character password, which the FBI found...schneier From Schneier on Security | July 1, 2010 at 02:02 PM
For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website...schneier From Schneier on Security | June 30, 2010 at 05:53 PM
From Brazil: the moral, of course, is to choose a strong key and to encrypt the entire drive, not just key files.
schneier From Schneier on Security | June 30, 2010 at 02:16 PM
Space terrorism? Yes, space terrorism. This article, by someone at the European Space Policy Institute, hypes a terrorst threat I've never seen hyped before....schneier From Schneier on Security | June 29, 2010 at 04:42 PM
This, from Congressman Louie Gohmert of Texas, is about as dumb as it gets:
I talked to a retired FBI agent who said that one of the things they were looking at...schneier From Schneier on Security | June 29, 2010 at 11:28 AM
I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...schneier From Schneier on Security | June 28, 2010 at 09:02 AM
"10 Everyday Items Hackers Are Targeting Right Now"
5. Your Blender. Yes, Your Blender
That's right: your blender is under attack! Most mixers are self-contained...schneier From Schneier on Security | June 25, 2010 at 06:47 PM
Interesting:
The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...schneier From Schneier on Security | June 25, 2010 at 11:53 AM
It's operational:
The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...schneier From Schneier on Security | June 24, 2010 at 06:21 PM
Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker.
Assange is an international trafficker, of sorts. He and his colleagues collect...schneier From Schneier on Security | June 24, 2010 at 06:13 PM
Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival:
No...schneier From Schneier on Security | June 23, 2010 at 06:16 PM
In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote:
"High-tech, low-tech, we can't...schneier From Schneier on Security | June 23, 2010 at 11:00 AM
The New York Times Room for Debate blog did the topic: "Do We Tolerate Too Many Traffic Deaths?"
schneier From Schneier on Security | June 22, 2010 at 04:50 PM
Interesting:
TM skimmers -- or fraud devices that criminals attach to cash machines in a bid to steal and ultimately clone customer bank card data -- are marketed...schneier From Schneier on Security | June 22, 2010 at 11:49 AM
If you give people enough incentive to cheat, people will cheat:
Of all the forms of academic cheating, none may be as startling as educators tampering with children's...schneier From Schneier on Security | June 21, 2010 at 05:01 PM
I didn't write about the recent security breach that disclosed tens of thousands of e-mail addresses and ICC-IDs of iPad users because, well, there was nothingwere...schneier From Schneier on Security | June 21, 2010 at 10:27 AM