From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This very interesting essay looks at the future of military robotics and finds many analogs in nature: Imagine a low-cost drone with the range of a Canada goose...Bruce Schneier From Schneier on Security | August 25, 2017 at 07:34 AM
Seems to be incompetence rather than malice, but a good example of the dangers of blindly trusting the cloud....Bruce Schneier From Schneier on Security | August 24, 2017 at 07:30 AM
Shonin is a personal bodycam up on Kickstarter. There are a lot of complicated issues surrounding bodycams -- for example, it's obvious that police bodycams reduce...Bruce Schneier From Schneier on Security | August 23, 2017 at 07:41 AM
Eddie Tipton, a programmer for the Multi-State Lottery Association, secretly installed software that allowed him to predict jackpots. What's surprising to me is...Bruce Schneier From Schneier on Security | August 22, 2017 at 07:40 AM
A new feature in Apple's new iPhone operating system -- iOS 11 -- will allow users to quickly disable Touch ID. A new setting, designed to automate emergency services...Bruce Schneier From Schneier on Security | August 21, 2017 at 07:57 AM
Watch a brittle star catch a squid, and then lose it to another brittle star. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | August 18, 2017 at 05:27 PM
I have successfully gotten the fake LinkedIn account in my name deleted. To prevent someone from doing this again, I signed up for LinkedIn. This is my first --...Bruce Schneier From Schneier on Security | August 18, 2017 at 03:14 PM
There is an unpatchable vulnerability that affects most modern cars. It's buried in the Controller Area Network (CAN): Researchers say this flaw is not a vulnerability...Bruce Schneier From Schneier on Security | August 18, 2017 at 07:40 AM
The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus...Bruce Schneier From Schneier on Security | August 17, 2017 at 07:12 AM
One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets -- or misinterprets -- in...Bruce Schneier From Schneier on Security | August 15, 2017 at 07:00 AM
This video purports to be a bank robbery in Kiev. He first threatens a teller, who basically ignores him because she's behind bullet-proof glass. But then the robber...Bruce Schneier From Schneier on Security | August 14, 2017 at 07:03 AM
Details on how a squid's eye corrects for underwater distortion: Spherical lenses, like the squids', usually can't focus the incoming light to one point as it passes...Bruce Schneier From Schneier on Security | August 11, 2017 at 05:24 PM
I seem to have a LinkedIn account. This comes as a surprise, since I don't have a LinkedIn account, and have never logged in to LinkedIn. Does anyone have any contacts...Bruce Schneier From Schneier on Security | August 11, 2017 at 03:34 PM
Researchers found that they could confuse the road sign detection algorithms of self-driving cars by adding stickers to the signs on the road. They could, for example...Bruce Schneier From Schneier on Security | August 11, 2017 at 07:31 AM
For once, the real story isn't as bad as it seems. A researcher has figured out how to install malware onto an Echo that causes it to stream audio back to a remote...Bruce Schneier From Schneier on Security | August 10, 2017 at 02:54 PM
Richard Ledgett -- a former Deputy Director of the NSA -- argues against the US government disclosing all vulnerabilities: Proponents argue that this would allow...Bruce Schneier From Schneier on Security | August 9, 2017 at 07:40 AM
Interesting story about Uber drivers who have figured out how to game the company's algorithms to cause surge pricing: According to the study. drivers manipulate...Bruce Schneier From Schneier on Security | August 8, 2017 at 10:35 AM
Interesting story: The venture is built on Alex's talent for reverse engineering the algorithms -- known as pseudorandom number generators, or PRNGs -- that govern...Bruce Schneier From Schneier on Security | August 7, 2017 at 07:00 AM
I never imagined that there would be fake news about squid. (That website lets you write your own stories.) As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | August 4, 2017 at 05:24 PM
Attackers used a vulnerability in an Internet-connected fish tank to successfully penetrate a casino's network. BoingBoing post....Bruce Schneier From Schneier on Security | August 4, 2017 at 07:22 AM