From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I note that the three "industry leaders" speaking at the DARPA Cyber Colloquium next week have about 75 years of government experience between them.schneier From Schneier on Security | November 1, 2011 at 06:41 PM
I was not surprised that police forces are buying this system, but at its capabilities.
Britain's largest police force is operating covert surveillance technology...schneier From Schneier on Security | October 31, 2011 at 05:29 PM
This brazen tactic is from Malaysia. Robbers sabotage the machines, and then report the damage to the bank. When the banks send repair technicians to open and...schneier From Schneier on Security | October 31, 2011 at 01:18 PM
It's hard to tell if he likes it.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 28, 2011 at 09:25 PM
Brian Kerbs has done the analysis; it's something like 760 companies that were compromised.
Among the more interesting names on the list are Abbott Labs, the Alabama...schneier From Schneier on Security | October 28, 2011 at 08:21 PM
Neat:
Researchers have invented a new form of secret messaging using bacteria that make glowing proteins only under certain conditions. In addition to being useful...schneier From Schneier on Security | October 27, 2011 at 05:01 PM
EFF reports on the security of SSL:
The most interesting entry in that table is the "CA compromise" one, because those are incidents that could affect any or every...schneier From Schneier on Security | October 27, 2011 at 11:45 AM
I don't follow historical cryptography, so all of this comes as a surprise to me. But something called the Copiale Cipher from the 18th Century has been cracked...schneier From Schneier on Security | October 26, 2011 at 11:02 AM
Google releases statistics:
Google received more than 15,600 requests in the January-June period, 10 percent more than the final six months of last year. The requests...schneier From Schneier on Security | October 26, 2011 at 10:54 AM
I've been told that the Twofish encryption algorithm is mentioned in the book Abuse of Power, in the first paragraph of Chapter 3. Did rhe terrorists use it?...schneier From Schneier on Security | October 25, 2011 at 05:58 PM
The second document in this file is the recently unclassified "Guide to Historical Cryptologic Acronyms and Abbreviations, 1940-1980," from the NSA
Note that there...schneier From Schneier on Security | October 25, 2011 at 10:31 AM
It's illegal for Blue Coat to sell its technology for this purpose, but there are lots of third-parties who are willing to act as middlemen:
"Blue Coat does not...schneier From Schneier on Security | October 24, 2011 at 06:39 PM
Patent number 2,011,023,240:
Communicating Information in a Social Network System about Activities from Another Domain
Abstract: In one embodiment, a method...schneier From Schneier on Security | October 24, 2011 at 11:42 AM
Interesting analysis:
the hacktivist group Anonymous hacked into several BART servers. They leaked part of a database of users from myBART, a website which provides...schneier From Schneier on Security | October 20, 2011 at 11:25 AM
A newly discovered piece of malware, Duqu, seems to be a precursor to the next Stuxnet-like worm and uses some of the same techniques as the original.schneier From Schneier on Security | October 19, 2011 at 04:05 PM
Things are getting interesting in Europe:
Max is a 24 year old law student from Vienna with a flair for the interview and plenty of smarts about both technology...schneier From Schneier on Security | October 18, 2011 at 11:34 AM