From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
According to new research:
The researchers found that subjects assigned leadership roles were buffered from the negative effects of lying. Across all measures,...schneier From Schneier on Security | March 30, 2010 at 06:59 PM
Nice essay:
Of course, we know why he's really there. He's really there so that if the bridge is destroyed by terrorists, the authorities can appear on the television...schneier From Schneier on Security | March 30, 2010 at 11:06 AM
The amazing story of Gerald Blanchard.
Thorough as ever, Blanchard had spent many previous nights infiltrating the bank to do recon or to tamper with the locks...schneier From Schneier on Security | March 29, 2010 at 06:48 PM
A potential new forensic:
To determine how similar a person's fingertip bacteria are to bacteria left on computer keys, the team took swabs from three computer...schneier From Schneier on Security | March 29, 2010 at 12:15 PM
Eerily accurate:
Catchy one-liner ("interesting," with link):
In this part of the blog post, Bruce quotes something from the article he links to in the catchy...schneier From Schneier on Security | March 26, 2010 at 06:16 PM
Modern photocopy machines contain hard drives that often have scans of old documents.
This matters when an office disposes of an old copier. It also matters if...schneier From Schneier on Security | March 26, 2010 at 04:27 PM
Nice paper: "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow," by Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang.
Abstract.explains...schneier From Schneier on Security | March 26, 2010 at 12:18 PM
James Fallows and I are being interviewed in Second Life tonight, 9:00 PM Eastern Time.
schneier From Schneier on Security | March 25, 2010 at 09:48 PM
Nice:
In this paper we revisit the assumption that shellcode need be fundamentally different in structure than non-executable data. Specifically, we elucidate...schneier From Schneier on Security | March 25, 2010 at 12:16 PM
Such "logic":
If a person on the no-fly list dies, his name could stay on the list so that the government can catch anyone trying to assume his identity.
Butanyone's...schneier From Schneier on Security | March 24, 2010 at 11:38 AM
I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...schneier From Schneier on Security | March 23, 2010 at 07:42 PM
In British Columbia:
When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...schneier From Schneier on Security | March 23, 2010 at 05:23 PM
Amazing:
The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...schneier From Schneier on Security | March 23, 2010 at 11:13 AM
MS Word has been dethroned:
Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...schneier From Schneier on Security | March 22, 2010 at 06:03 PM
This, from a former CIA chief of station:
The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...schneier From Schneier on Security | March 22, 2010 at 02:10 PM
Plastination:
For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...schneier From Schneier on Security | March 19, 2010 at 09:47 PM
This would worry me, if the liquid ban weren't already useless.
The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...schneier From Schneier on Security | March 19, 2010 at 05:58 PM