From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors:
The problem with threat inflation and misapplied history is that there...schneier From Schneier on Security | August 26, 2011 at 04:09 PM
John Mueller and his students analyze the 33 cases of attempted terrorism in the U.S. since 9/11. So few of them are actually real, and so many of them were created...schneier From Schneier on Security | August 26, 2011 at 11:26 AM
Nick Helm won an award for the funniest joke at the Edinburgh Fringe Festival:
Nick Helm: "I needed a password with eight characters so I picked Snow White and...schneier From Schneier on Security | August 25, 2011 at 09:08 PM
The security problems associated with moving $12B in gold from London to Venezuela.
It seems to me that Chschneier From Schneier on Security | August 25, 2011 at 05:43 PM
It's easy:
Researchers from UCSD pointed thermal cameras towards plastic ATM PIN pads and metal ATM PIN pads to test how effective they were at stealing PIN numbers...schneier From Schneier on Security | August 24, 2011 at 12:13 PM
Clever:
"When the user types on the soft keyboard on her smartphone (especially when she holds her phone by hand rather than placing it on a fixed surface), the...schneier From Schneier on Security | August 23, 2011 at 07:09 PM
Worried about someone hacking your implanted medical devices? Here's a signal-jamming device you can wear.schneier From Schneier on Security | August 23, 2011 at 11:56 AM
Sleeve cameras aren't new, but they're now smaller than ever and the cheaters are getting more sophisticated:
In January, at the newly opened $4-billion Cosmopolitan...schneier From Schneier on Security | August 23, 2011 at 10:44 AM
Long essay on the value of pseudonymity. From the conclusions:
Here lies the huge irony in this discussion. Persistent pseudonyms aren't ways to hide who yoube...schneier From Schneier on Security | August 22, 2011 at 11:01 AM
Nice essay on the danger of too much security:
The great lie of the war on terror is not that we can sacrifice a little liberty for greater security. It is that...schneier From Schneier on Security | August 19, 2011 at 06:57 PM
Any institution delegated with the task of preventing terrorism has a dilemma: they can either do their best to prevent terrorism, or they can do their best toA...schneier From Schneier on Security | August 19, 2011 at 01:55 PM
It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker:
The discrepancy between the panic generated by terrorism and the deaths...schneier From Schneier on Security | August 18, 2011 at 06:32 PM
"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger.
Abstract. Since Rijndael was chosen as the Advanced...schneier From Schneier on Security | August 18, 2011 at 11:12 AM
A prison in Brazil uses geese as part of its alarm system.
There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...schneier From Schneier on Security | August 17, 2011 at 06:51 PM
Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.schneier From Schneier on Security | August 17, 2011 at 11:13 AM
Really interesting research.
Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high...schneier From Schneier on Security | August 16, 2011 at 03:47 PM