From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice work:
All current Cisco IP phones, including the ones seen on desks in the White House and aboard Air Force One, have a vulnerability that allows hackers...schneier From Schneier on Security | March 12, 2013 at 06:43 PM
Interesting essay:
Surveillance is part of the system of control. "The more surveillance, the more control" is the majority belief amongst the ruling elites....schneier From Schneier on Security | March 12, 2013 at 11:45 AM
Hats:
De Blowitz was staying at the Kaiserhof. Each day his confederate went there for lunch and dinner. The two never acknowledged one another, but they hung...schneier From Schneier on Security | March 11, 2013 at 05:58 PM
I worry that comments about the value of software security made at the RSA Conference last week will be taken out of context. John Viega did not say that software...schneier From Schneier on Security | March 11, 2013 at 11:12 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 8, 2013 at 10:06 PM
The second edition of Ross Anderson's fantastic book, Security Engineering, is now free online. Required reading for any security engineer.schneier From Schneier on Security | March 8, 2013 at 06:08 PM
Google Docs is being used for phishing. Oxford University felt that it had to block the service because Google isn't responding to takedown requests quickly enough...schneier From Schneier on Security | March 8, 2013 at 12:23 PM
Good article on "Stingrays," which the FBI uses to monitor cell phone data. Basically, they trick the phone into joining a fake network. And, since cell phones...schneier From Schneier on Security | March 7, 2013 at 07:39 PM
Interesting discussion on browser security from Communications of the ACM. Also, an article on browser and web privacy from the same issue.schneier From Schneier on Security | March 7, 2013 at 12:45 PM
A new book reveals details about the NSA's Ragtime surveillance program:
A book published earlier this month, "Deep State: Inside the Government Secrecy Industry...schneier From Schneier on Security | March 6, 2013 at 07:24 PM
Interesting:
3 – Spreading the reflective pieces of glass on a car or on the roof of the building.
4 – Placing a group of skilled snipers to hunt the drone, especially...schneier From Schneier on Security | March 6, 2013 at 12:50 PM
Marcus Ranum has an interesting screed on "booth babes" in the RSA Conference exhibition hall:
I'm not making a moral argument about sexism in our industry orsame...schneier From Schneier on Security | March 5, 2013 at 07:58 PM
It's a new day for the New York Police Department, with technology increasingly informing the way cops do their jobs. With innovation comes new possibilities but...schneier From Schneier on Security | March 5, 2013 at 12:28 PM
I hadn't heard of this one before. In New Zealand, people viewing adult websites -- it's unclear whether these are honeypot sites, or malware that notices thepop...schneier From Schneier on Security | March 4, 2013 at 08:04 PM
One of the problems with motivating proper security behavior within an organization is that the incentives are all wrong. It doesn't matter how much management...schneier From Schneier on Security | March 4, 2013 at 12:38 PM
Another.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 1, 2013 at 10:36 PM
This isn't phishing; it's not even spear phishing. It's laser-guided precision phishing:
One of the leaked diplomatic cables referred to one attack via emailwrote...schneier From Schneier on Security | March 1, 2013 at 11:05 AM
Recently, Elon Musk and the New York Times took to Twitter and the Internet to argue the data -- and their grievances -- over a failed road test and car review....schneier From Schneier on Security | February 28, 2013 at 08:40 PM