From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti:
Abstract: In recent years, a large number of data breaches...schneier From Schneier on Security | March 27, 2012 at 12:24 PM
I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...schneier From Schneier on Security | March 26, 2012 at 06:02 PM
This is a neat story:
A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...schneier From Schneier on Security | March 26, 2012 at 11:38 AM
On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted...schneier From Schneier on Security | March 23, 2012 at 11:33 AM
In an excellent article in Wired, James Bamford talks about the NSA's codebreaking capability.
According to another top official also involved with the program...schneier From Schneier on Security | March 22, 2012 at 12:17 PM
A way to securely erase paper:
"The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time isNew...schneier From Schneier on Security | March 21, 2012 at 11:26 AM
A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph:
At a closed-door briefing, the senators were shown howtake...schneier From Schneier on Security | March 20, 2012 at 01:52 PM
Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.schneier From Schneier on Security | March 19, 2012 at 07:33 PM
I like the quote at the end of this excerpt:
Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they...schneier From Schneier on Security | March 19, 2012 at 11:38 AM
It looks great.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 16, 2012 at 09:57 PM
Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins).schneier From Schneier on Security | March 16, 2012 at 03:35 PM
The U.S. military has a non-lethal heat ray. No details on what "non-lethal" means in this context.schneier From Schneier on Security | March 16, 2012 at 12:09 PM
I have several stories in the news (and one podcast), mostly surrounding the talks I gave at the RSA Conference last month.schneier From Schneier on Security | March 15, 2012 at 07:35 PM
First, five new reviews of the book.
Second, four new AV interviews about the book.
Third, I take the Page 99 Test.schneier From Schneier on Security | March 15, 2012 at 11:16 AM
Good article by Thomas Rid on the hype surrounding cyberwar. It's well worth reading.
And in a more academic paper, published in the RUSI Journal, Thomas Ridgeneric...schneier From Schneier on Security | March 14, 2012 at 11:22 AM
Ths person didn't like it at all.
It'll go up on the book's webpage, along with all the positive reviews.schneier From Schneier on Security | March 13, 2012 at 07:01 PM
Interesting research on the security of passphrases. From a blog post on the work:
We found about 8,000 phrases using a 20,000 phrase dictionary. Using a very...schneier From Schneier on Security | March 13, 2012 at 04:50 PM
The Internet is buzzing about this video, showing a blogger walking through two different types of full-body scanners with metal objects. Basically, by placing...schneier From Schneier on Security | March 12, 2012 at 09:30 PM