From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
AI theorist Eliezer Yudkowsky: "Every eighteen months, the minimum IQ necessary to destroy the world drops by one point." Oh, how I wish I said that....Bruce Schneier From Schneier on Security | October 1, 2015 at 01:03 PM
During the Cold War, the KGB was very adept at identifying undercover CIA officers in foreign countries through what was basically big data analysis. (Yes, this...Bruce Schneier From Schneier on Security | October 1, 2015 at 08:00 AM
The website Unfitbits.com has a series of instructional videos on how to spoof fitness trackers, using such things as a metronome, pendulum, or power drill. With...Bruce Schneier From Schneier on Security | September 30, 2015 at 01:02 PM
For the past six years, Volkswagen has been cheating on the emissions testing for its diesel cars. The cars' computers were able to detect when they were being...Bruce Schneier From Schneier on Security | September 30, 2015 at 10:56 AM
The Intercept has a new story from the Snowden documents about The UK's GCHQ's surveillance of the Internet: The mass surveillance operation code-named KARMA...Bruce Schneier From Schneier on Security | September 29, 2015 at 07:16 AM
Fortune has a three-part article on the Sony attack by North Korea. There's not a lot of tech here; it's mostly about Sony's internal politics regarding the movie...Bruce Schneier From Schneier on Security | September 28, 2015 at 07:22 AM
It looks like a Nintendo game. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 25, 2015 at 05:30 PM
You can wrap your house in tinfoil, but when you start shining bright lights to defend yourself against alien attack, you've gone too far. In general, society puts...Bruce Schneier From Schneier on Security | September 25, 2015 at 03:23 PM
No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates...Bruce Schneier From Schneier on Security | September 25, 2015 at 06:54 AM
In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the "combat mind-set." Here is his summary: In White...Bruce Schneier From Schneier on Security | September 24, 2015 at 12:39 PM
Fascinating story about a man who figured out how to hack the game show "Press Your Luck" in 1984....Bruce Schneier From Schneier on Security | September 23, 2015 at 07:05 AM
The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....Bruce Schneier From Schneier on Security | September 22, 2015 at 02:34 PM
Gizmodo reports that UK airport security confiscates frozen liquids: "He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid....Bruce Schneier From Schneier on Security | September 22, 2015 at 02:22 PM
FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case...Bruce Schneier From Schneier on Security | September 21, 2015 at 12:45 PM
Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took...Bruce Schneier From Schneier on Security | September 21, 2015 at 07:34 AM
It looks impressive, maybe 20-30 feet long: "I think this might be the coolest thing I have ever built," said Barry Crawford about his giant, metal squid that was...Bruce Schneier From Schneier on Security | September 19, 2015 at 01:33 PM
Here's a watch that monitors the movements of your hand and can guess what you're typing. Using the watch's built-in motion sensors, more specifically data from...Bruce Schneier From Schneier on Security | September 18, 2015 at 06:20 AM
Okay, this is weird. FireEye has gone to court to prevent ERNW from disclosing vulnerabilities in FireEye products. FireEye should know better. Here's FireEye's...Bruce Schneier From Schneier on Security | September 17, 2015 at 01:56 PM
The chip is built on glass: Shattering the glass is straightforward. When the proper circuit is toggled, a small resistor within the substrate heats up until the...Bruce Schneier From Schneier on Security | September 17, 2015 at 08:17 AM