From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Squirrel terrorists.
We have a cognitive bias to exaggerate risks caused by other humans, and downplay risks caused by animals (and, even more, by natural phenomena...schneier From Schneier on Security | October 30, 2009 at 03:17 PM
"Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation," prepared for the US-China Economic and Security Review...schneier From Schneier on Security | October 30, 2009 at 09:54 AM
The U.S. Deputy Director of National Intelligence for Collection gives a press conference on the new Utah data collection facility: video and transcript.
schneier From Schneier on Security | October 29, 2009 at 05:59 PM
A critical essay on the TSA from a former assistant police chief:
This is where I find myself now obsessing over TSA policy, or its apparent lack. Every one of...schneier From Schneier on Security | October 29, 2009 at 09:59 AM
Only $99.99:
Keep tabs on your child at all times with this small but sophisticated device that combines GPS and cellular technology to provide you with real-time...schneier From Schneier on Security | October 28, 2009 at 06:28 PM
Ross Anderson has put together a great resource page on security and psychology:
At a deeper level, the psychology of security touches on fundamental scientific...schneier From Schneier on Security | October 28, 2009 at 10:29 AM
From Wired:
In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes...schneier From Schneier on Security | October 26, 2009 at 11:12 AM
Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption...schneier From Schneier on Security | October 23, 2009 at 09:49 AM
James Bamford -- author of The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America writes about the NSA's new data center in Utah as he reviews another...schneier From Schneier on Security | October 22, 2009 at 11:10 AM
According to the Telegraph:
Mr Ballmer said: "We got some uneven reception when [Vista] first launched in large part because we made some design decisions to improve...schneier From Schneier on Security | October 21, 2009 at 12:46 PM
From the Courier-Mail:
A man who established a sophisticated network of peepholes and cameras to spy on his flatmates has escaped a jail sentence after police...schneier From Schneier on Security | October 21, 2009 at 09:15 AM
Story here. Basically, a woman posts a horrible story of how she was mistreated by the TSA, and the TSA responds by releasing the video showing that she was lying...schneier From Schneier on Security | October 20, 2009 at 03:42 PM
All it takes is a computer that can track every card:
The anti-card-counter system uses cameras to watch players and keep track of the actual "count" of the cards...schneier From Schneier on Security | October 20, 2009 at 11:16 AM
Nice article summing up six years of Microsoft Patch Tuesdays:
The total number of flaws disclosed and patched by the software maker so far this year stands at...schneier From Schneier on Security | October 19, 2009 at 08:38 PM
"Fugitive caught after updating his status on Facebook." It's easy to say "so dumb," and it would be true, but what's interesting is how people just don't think...schneier From Schneier on Security | October 19, 2009 at 12:55 PM
A few years ago, a company began to sell a liquid with identification codes suspended in it. The idea was that you would paint it on your stuff as proof of ownership...schneier From Schneier on Security | October 16, 2009 at 01:56 PM