From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A recent Ars Technica article made the point that password crackers are getting better, and therefore passwords are getting weaker. It's not just computing speed...schneier From Schneier on Security | September 19, 2012 at 09:41 AM
A space-traveling squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 18, 2012 at 09:37 PM
It's a known theft tactic to swallow what you're stealing. It works for food at the supermarket, and it also can work for diamonds. Here's a twist on that tactic...schneier From Schneier on Security | September 17, 2012 at 02:10 PM
In Valdés, Spain.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 14, 2012 at 09:15 PM
Two of my books can be seen in the background in CBS' new Sherlock Holmes drama, Elementary. A copy of Schneier on Security is prominently displayed on Sherlock...schneier From Schneier on Security | September 14, 2012 at 07:20 PM
This sort of attack will become more common as banks require two-factor authentication:
Tatanga checks the user account details including the number of accounts...schneier From Schneier on Security | September 14, 2012 at 04:23 PM
This statistical research says once per decade:
Abstract: Quantities with right-skewed distributions are ubiquitous in complex social systems, including political...schneier From Schneier on Security | September 13, 2012 at 06:20 PM
Nice essay on the futility of trying to prevent another 9/11:
"Never again." It is as simplistic as it is absurd. It is as vague as it is damaging. No two words...schneier From Schneier on Security | September 12, 2012 at 05:55 PM
The "Australia's Security Nightmares: The National Security Short Story Competition" is part of Safeguarding Australia 2012.
To aid the national security community...schneier From Schneier on Security | September 12, 2012 at 11:23 AM
Well, new to us:
You see, an EMV payment card authenticates itself with a MAC of transaction data, for which the freshly generated component is the unpredictable...schneier From Schneier on Security | September 11, 2012 at 02:35 PM
There's a lot:
Advance tickets are required to enter this public, outdoor memorial. To book them, you’re obliged to provide your home address, email address, and...schneier From Schneier on Security | September 11, 2012 at 11:45 AM
Larry Constantine disputes David Stanger's book about Stuxnet:
So, what did he get wrong? First of all, the Stuxnet worm did not escape into the wild. The analysis...schneier From Schneier on Security | September 10, 2012 at 11:51 AM
Wacky. Other stories about the story.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 7, 2012 at 09:41 PM
Truly bizarre story of someone who seems to have figured out how to successfully cheat at marathons. The evidence of his cheating is overwhelming, but no one knows...schneier From Schneier on Security | September 7, 2012 at 12:10 PM
I'm trying to separate cloud security hype from reality. To that end, I'd like to talk to a few big corporate CSOs or CISOs about their cloud security worries,...schneier From Schneier on Security | September 6, 2012 at 05:31 PM
In this story, we learn that hackers got their hands on a database of 12 million Apple Apple Unique Device Identifiers (UDIDs) by hacking an FBI laptop.
When I...schneier From Schneier on Security | September 6, 2012 at 11:48 AM
Liars and Outliers (along with two other books: Kip Hawley's memoir of his time at the TSA and Against Security, by Harvey Molotch) has been reviewed in the Wall...schneier From Schneier on Security | September 5, 2012 at 07:04 PM
In this fascinating piece of research, the question is asked: can we surreptitiously collect secret information from the brains of people using brain-computer interface...schneier From Schneier on Security | September 5, 2012 at 11:06 AM