From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Amy Zegert has some good questions, comparing the Orlando Pulse massacre to the Fort Hood massacre from 2009....Bruce Schneier From Schneier on Security | June 22, 2016 at 07:04 AM
Ronald V. Clarke argues for more situational awareness in crime prevention. Turns out if you make crime harder, it goes down. And this has profound policy implications...Bruce Schneier From Schneier on Security | June 21, 2016 at 01:16 PM
Interesting: Since the team had tracked these groups daily, researchers could observe the tactics that pro-ISIS groups use to evade authorities. They found that...Bruce Schneier From Schneier on Security | June 21, 2016 at 07:01 AM
Last week, CIA director John Brennan told a Senate committee that there wasn't any strong cryptography outside of the US. CIA director John Brennan told US senators...Bruce Schneier From Schneier on Security | June 20, 2016 at 01:24 PM
The New York Times is reporting that some women in China are being forced to supply nude photos of themselves as collateral for getting a loan. Aside from the awfulness...Bruce Schneier From Schneier on Security | June 20, 2016 at 07:01 AM
The Internet is buzzing -- at least, my little corner of the Internet -- about finding a 120-meter-long giant squid on Google Earth. It's a false alarm. As usual...Bruce Schneier From Schneier on Security | June 17, 2016 at 05:05 PM
This essay argues that teaching computer science at the K-12 level is a matter of national security. I think the argument is even broader. Computers, networks,...Bruce Schneier From Schneier on Security | June 17, 2016 at 07:33 AM
At the Apple Worldwide Developers Conference earlier this week, Apple talked about something called "differential privacy." We know very little about the details...Bruce Schneier From Schneier on Security | June 16, 2016 at 10:30 PM
Typosquatting is an old trick of registering a domain name a typo away from a popular domain name and using it for various nefarious purposes. Nikolai Philipp Tschacher...Bruce Schneier From Schneier on Security | June 15, 2016 at 07:47 AM
The Washington Post is reporting that Russian hackers penetrated the network of the Democratic National Committee and stole opposition research on Donald Trump....Bruce Schneier From Schneier on Security | June 14, 2016 at 01:50 PM
There's an interesting message in the documents about Snowden that Vice magazine got out of the NSA with a FOIA request. At least in 2012, the NSA was using Word...Bruce Schneier From Schneier on Security | June 13, 2016 at 08:01 AM
Two years ago, I posted a photograph of a beautiful giant bronze squid sculpture by Kirk McGuire. He has a new sculpture: a squid table base. it's also beautiful...Bruce Schneier From Schneier on Security | June 10, 2016 at 05:38 PM
This interesting essay argues that financial risks are generally not systemic risks, and instead are generally much smaller. That's certainly been our experience...Bruce Schneier From Schneier on Security | June 10, 2016 at 01:56 PM
It makes for interesting reading. Someone noticed that parts of it read like standard modern office procedures....Bruce Schneier From Schneier on Security | June 10, 2016 at 10:54 AM
People who don't want Wayz routing cars through their neighborhoods are feeding it false data. It was here that Connor learned that some Waze warriors had launched...Bruce Schneier From Schneier on Security | June 9, 2016 at 07:17 AM
Really good investigative reporting on the automatic algorithms used to predict recidivism rates....Bruce Schneier From Schneier on Security | June 8, 2016 at 02:14 PM
Lots of details that demonstrate that Snowden did try to raise his concerns internally before going public, and that the NSA lied about this....Bruce Schneier From Schneier on Security | June 8, 2016 at 07:44 AM
New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...Bruce Schneier From Schneier on Security | June 7, 2016 at 03:59 PM
There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...Bruce Schneier From Schneier on Security | June 6, 2016 at 07:10 AM