From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This story is about how at least two professional online poker players had their hotel rooms broken into and their computers infected with malware.
I agree with...schneier From Schneier on Security | December 16, 2013 at 07:09 AM
Snappy-looking bow tie.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | December 13, 2013 at 05:05 PM
This is an interesting story from World War II about trust:
Jones notes that the Germans doubted their system because they knew the British could radio false orders...schneier From Schneier on Security | December 13, 2013 at 12:20 PM
Last week the Washington Post reported on how the NSA tracks mobile phones world-wide, and this week they followed up with source documents and more detail.
Barton...schneier From Schneier on Security | December 12, 2013 at 01:55 PM
The Washington Post has a detailed article on how the NSA uses cookie data to track individuals. The EFF also has a good post on this.
I have been writing and...schneier From Schneier on Security | December 12, 2013 at 07:21 AM
The NSA is spying on chats in World of Warcraft and other games. There's lots of information -- and a good source document. While it's fun to joke about the NSA...schneier From Schneier on Security | December 10, 2013 at 10:08 AM
The weird squid-like creature floating around Bristol Harbour is a hoax.
As usual, you can also use this squid post to talk about the security stories in the news...schneier From Schneier on Security | December 6, 2013 at 05:33 PM
I have a new book. It's Carry On: Sound Advice from Schneier on Security, and it's my second collection of essays. This book covers my writings from March 2008...schneier From Schneier on Security | December 6, 2013 at 03:47 PM
0-Day Clothing has taken 25 Bruce Schneier Facts and turned them into T-shirts just in time for Christmas.schneier From Schneier on Security | December 6, 2013 at 03:16 PM
Telepathwords is a pretty clever research project that tries to evaluate password strength. It's different from normal strength meters, and I think better.
Telepathwords...schneier From Schneier on Security | December 6, 2013 at 07:19 AM
Here's a new biometric I know nothing about:
The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...schneier From Schneier on Security | December 5, 2013 at 02:16 PM
Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course.
And to make it legal...schneier From Schneier on Security | December 5, 2013 at 07:58 AM
The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff.
It's not new, though. Peopleexplained...schneier From Schneier on Security | December 4, 2013 at 07:28 AM
As more and more media outlets from all over the world continue to report on the Snowden documents, it's harder and harder to keep track of what has been released...schneier From Schneier on Security | December 3, 2013 at 07:14 AM
One of the things I do is expert witness work in patent litigations. Often, it's defending companies against patent trolls. One of the patents I have worked on...schneier From Schneier on Security | December 2, 2013 at 01:48 PM
Since we learned that the NSA has surreptitiously weakened Internet security so it could more easily eavesdrop, we've been wondering if it's done anything to antivirus...schneier From Schneier on Security | December 2, 2013 at 07:05 AM
This squid-like worm -- Teuthidodrilus samae -- is new to science.
As usual, you can also use this squid post to talk about the security stories in the news that...schneier From Schneier on Security | November 29, 2013 at 05:15 PM
Ralph Langer has written the definitive analysis of Stuxnet: short, popular version, and long, technical version.
Stuxnet is not really one weapon, but two. The...schneier From Schneier on Security | November 29, 2013 at 07:18 AM