From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Should companies spend money on security awareness training for their employees? It's a contentious topic, with respected experts on both sides of the debate.right...schneier From Schneier on Security | March 27, 2013 at 11:47 AM
The NSA has published declassified versions of its Cryptolog newsletter. All the issues from Aug 1974 through Summer 1997 are on the web, although there are some...schneier From Schneier on Security | March 26, 2013 at 07:15 PM
Turns out that it's pretty easy:
Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth...schneier From Schneier on Security | March 26, 2013 at 02:29 PM
I'm going to start with three data points.
One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. governmentaccessed...schneier From Schneier on Security | March 25, 2013 at 11:28 AM
Despite looking very different from each other and being distributed across the world's oceans, all giant squid are the same species. There's also not a lot of...schneier From Schneier on Security | March 22, 2013 at 09:12 PM
I have made a few changes to my blog that I'd like to talk about.
The first is the various buttons associated with each post: a Facebook Like button, a Retweet...schneier From Schneier on Security | March 22, 2013 at 08:46 PM
Both Google and recently ruled National Security Letters unconstitutional. Not that this changes anything yet.schneier From Schneier on Security | March 22, 2013 at 12:10 PM
The FBI wants cell phone carriers to store SMS messages for a long time, enabling them to conduct surveillance backwards in time. Nothing new there -- data retention...schneier From Schneier on Security | March 21, 2013 at 06:17 PM
A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...schneier From Schneier on Security | March 21, 2013 at 12:02 PM
This article is worth reading. One bit:
For a time the FBI put its back into coming up with predictive analytics to help predict insider behavior prior to malicious...schneier From Schneier on Security | March 20, 2013 at 04:51 PM
Twenty five countries are using the FinSpy surveillance software package (also called FinFisher) to spy on their own citizens:
The list of countries with servers...schneier From Schneier on Security | March 19, 2013 at 06:34 PM
From the CIA archives: Orrin Clotworthy, "Some Far-out Thoughts on Computers," Studies in Intelligence v. 6 (1962).schneier From Schneier on Security | March 18, 2013 at 06:00 PM
Symantec has found evidence of Stuxnet variants from way back in 2005. That's much older than the 2009 creation date we originally thought it had. More here and...schneier From Schneier on Security | March 15, 2013 at 10:46 AM
Interesting law paper: "The Implausibility of Secrecy," by Mark Fenster.
Abstract: Government secrecy frequently fails. Despite the executive branch’s obsessive...schneier From Schneier on Security | March 14, 2013 at 05:19 PM
For technology that was supposed to ignore borders, bring the world closer together, and sidestep the influence of national governments the Internet is fostering...schneier From Schneier on Security | March 14, 2013 at 11:11 AM
Click on the "Establishing secure connection" link at the top of this page. It's a Wells Fargo page that displays a progress bar with a bunch of security phrases...schneier From Schneier on Security | March 13, 2013 at 06:30 PM