From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The U.S Supreme Court has ruled that the police cannot attach a GPS tracking device to a car without a warrant.schneier From Schneier on Security | January 25, 2012 at 06:54 PM
The NSF is funding research on giving organizations information-security risk ratings, similar to credit ratings for individuals:
Existing risk management techniques...schneier From Schneier on Security | January 25, 2012 at 12:44 PM
Turns out you can create unique signatures from plant DNA. The idea is to spray this stuff on military components in order to verify authentic items and detect...schneier From Schneier on Security | January 24, 2012 at 12:46 PM
DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse...schneier From Schneier on Security | January 23, 2012 at 05:49 PM
The state of Texas gets an armed PT boat.
I guess armed drones weren't enough for them. schneier From Schneier on Security | January 20, 2012 at 12:39 PM
I wrote about this technique in Beyond Fear:
Beginning Sunday evening, the robbers intentionally set off the gallery's alarm system several times without entering...schneier From Schneier on Security | January 19, 2012 at 12:36 PM
Thankfully, this doesn't happen very often:
A US man who had been convicted on a second-degree murder charge will get a new trial after a computer virus destroyed...schneier From Schneier on Security | January 17, 2012 at 01:31 PM
Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...schneier From Schneier on Security | January 17, 2012 at 09:31 AM
This is a first:
...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...schneier From Schneier on Security | January 16, 2012 at 03:58 PM
Yet another story that combines squid and security.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | January 13, 2012 at 10:19 PM
Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...schneier From Schneier on Security | January 13, 2012 at 06:58 PM
It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...schneier From Schneier on Security | January 13, 2012 at 12:58 PM
I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...schneier From Schneier on Security | January 12, 2012 at 09:04 PM
The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.schneier From Schneier on Security | January 12, 2012 at 08:39 PM
Very interesting:
The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...schneier From Schneier on Security | January 12, 2012 at 06:37 PM
Apple has a patent on splitting a key between a portable device and its power supply.
Clever idea.schneier From Schneier on Security | January 12, 2012 at 11:53 AM
John Mueller has been collecting them:
Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...schneier From Schneier on Security | January 10, 2012 at 12:56 PM