From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is an interesting piece of research evaluating different user interface designs by which applications disclose to users what sort of authority they need to...schneier From Schneier on Security | May 21, 2010 at 06:17 PM
"Experimental Security Analysis of a Modern Automobile," by a whole mess of authors:
Abstract: Modern automobiles are no longer mere mechanical devices; they are...schneier From Schneier on Security | May 21, 2010 at 11:56 AM
Interesting research.
Main results:
[...]
We analyzed the results from over a quarter of a million people who ran our tests in the last few months, and found...schneier From Schneier on Security | May 20, 2010 at 06:28 PM
Dolphine and sea lions:
A Navy seal - actually a sea lion - took less than a minute to find a fake mine under a pier near San Francisco's AT&T Park.
A dolphin...schneier From Schneier on Security | May 20, 2010 at 11:50 AM
This doesn't seem like the best idea:
Authorities in the southern Indian state of Andhra Pradesh are planning to set up an outsourcing unit in a jail.
The unit...schneier From Schneier on Security | May 18, 2010 at 12:29 PM
Sounds like fearmongering to me.
How real is the threat? Many of the world's most dangerous pathogens already are transmitted by arthropods, the animal phylum...schneier From Schneier on Security | May 17, 2010 at 06:30 PM
The British High Court ruled that a software vendor's EULA -- which denied all liability for poor software -- was not reasonable.
I wrote about software liabilities...schneier From Schneier on Security | May 17, 2010 at 11:18 AM
It's still only in the lab, but nothing detects it right now:
The attack is a clever "bait-and-switch" style move. Harmless code is passed to the security software...schneier From Schneier on Security | May 14, 2010 at 04:50 PM
On April 1, I announced the Fifth Annual Movie Plot Threat Contest:
Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...schneier From Schneier on Security | May 14, 2010 at 11:51 AM
At a security conference recently, the moderator asked the panel of distinguished cybersecurity leaders what their nightmare scenario was. The answers were the...schneier From Schneier on Security | May 13, 2010 at 09:33 AM
That slogan is owned by New York's Metropolitan Transit Authority (the MTA).
Since obtaining the trademark in 2007, the authority has granted permission to use...schneier From Schneier on Security | May 12, 2010 at 12:08 PM
Cool idea, or dumb idea?
Its features include:
Fingerprint access only
Bluetooth enabled for notification alertsschneier From Schneier on Security | May 11, 2010 at 05:27 PM
I sure hope this is a parody:
SnapScouts Keep America Safe!
Want to earn tons of cool badges and prizes while competing with you friends to see who can be the...schneier From Schneier on Security | May 10, 2010 at 07:11 PM
There's an essay on the Computerworld website that claims I implied, and believe, so:
OK, so strictly-speaking, he doesn't use those exact words, but the implication...schneier From Schneier on Security | May 10, 2010 at 11:15 AM
New research shows that, even though it's 15 meters long, it's not the kraken of myth:
Its large size and predatory nature fuelled the ancient myth of the underwater...schneier From Schneier on Security | May 7, 2010 at 09:26 PM
Someone named me as one of the top 10 science and technology writers of all time. Flattering though it is, I don't think I belong in the company of Einstein, Newton...schneier From Schneier on Security | May 7, 2010 at 06:35 PM