From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....schneier From Schneier on Security | June 1, 2011 at 01:59 PM
That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...schneier From Schneier on Security | May 31, 2011 at 06:12 PM
In my latest book (available February), I talk about various mechanisms for societal security: how we as a group protect ourselves from the "dishonest minority"...schneier From Schneier on Security | May 31, 2011 at 11:34 AM
Cyber criminals are getting aggressive with their social engineering tactics.
Val Christopherson said she received a telephone call last Tuesday from a man stating...schneier From Schneier on Security | May 30, 2011 at 11:58 AM
All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...schneier From Schneier on Security | May 27, 2011 at 11:04 AM
It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...schneier From Schneier on Security | May 26, 2011 at 06:57 PM
It's now available as a free download:
A free version of the Blackhole exploit kit has appeared online in a development that radically reduces the entry-level...schneier From Schneier on Security | May 25, 2011 at 03:28 PM
SCADA systems -- computer systems that control industrial processes -- are one of the ways a computer hack can directly affect the real world. Here, the fearssuccessfully...schneier From Schneier on Security | May 24, 2011 at 10:50 AM
I haven't written about Dropbox's security problems; too busy with the book. But here's an excellent summary article from The Economist.
The meta-issue is pretty...schneier From Schneier on Security | May 23, 2011 at 11:47 AM
The Centers for Disease Control and Prevention weigh in on preparations for the zombie apocalypse.
schneier From Schneier on Security | May 20, 2011 at 09:00 PM
TSA-style security is now so normal that it's part of a Disney ride:
The second room of the queue is now a security check area, similar to a TSA checkpoint. The...schneier From Schneier on Security | May 20, 2011 at 07:43 PM
For years, an employee of Cubic Corp -- the company who makes the automatic fair card systems for most of the subway systems around the world -- forged forged and...schneier From Schneier on Security | May 20, 2011 at 12:44 PM
From the Associated Ptress:
Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the U.S....schneier From Schneier on Security | May 18, 2011 at 01:45 PM
Scanning fingerprints from six feet away.
Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light....schneier From Schneier on Security | May 17, 2011 at 12:46 PM