From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?":
There has been much academic discussion of federated authentication...schneier From Schneier on Security | March 29, 2011 at 11:43 AM
This is an interesting read:
It was a question that changed his life, and changed mine, and may have changed -- even saved -- all of ours by calling attention...schneier From Schneier on Security | March 25, 2011 at 05:22 PM
Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users":
Abstract: Tor is a popular low-latency anonymity...schneier From Schneier on Security | March 25, 2011 at 09:34 AM
Interesting:
Abstract: Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse...schneier From Schneier on Security | March 24, 2011 at 05:46 PM
This is cool:
Tristan Lawry, doctoral candidate in electrical and computer engineering, has developed equipment which can transmit data at high rates through thick...schneier From Schneier on Security | March 24, 2011 at 12:37 PM
I found this article on the difference between threats and vulnerabilities to be very interesting. I like his taxonomy.
schneier From Schneier on Security | March 23, 2011 at 11:34 AM
This is a really interesting paper: "Folk Models of Home Computer Security," by Rick Wash. It was presented at SOUPS, the Symposium on Usable Privacy and Security...schneier From Schneier on Security | March 22, 2011 at 12:12 PM
I didn't post about it when I first saw it because I suspected a hoax. Turns out, I was right. It wasn't even two guys faking hacking a Times Square video screen...schneier From Schneier on Security | March 21, 2011 at 05:57 PM
The company, not the algorithm. Here's the corporate spin.
Our investigation has led us to believe that the attack is in the category of an Advanced Persistent...schneier From Schneier on Security | March 21, 2011 at 11:52 AM
The security connection is pretty tenuous, so I figured I'd blog this on a Saturday.
Once it infects an ant, the fungus uses as-yet-unidentified chemicals to control...schneier From Schneier on Security | March 19, 2011 at 02:12 PM
Clever hack:
The thieves glue down the "enter," "cancel" and "clear" buttons on the keypad and wait until the customer goes into the bank for help before withdrawing...schneier From Schneier on Security | March 17, 2011 at 11:50 AM
Impressive research:
By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car's stereo...schneier From Schneier on Security | March 16, 2011 at 11:14 AM
Interesting research. It only works when there's a limited number of potential authors:
To test the accuracy of their technique, Fung and his colleagues examined...schneier From Schneier on Security | March 14, 2011 at 09:46 AM
This three-part video interview with me was conducted at the RSA Conference last month.
schneier From Schneier on Security | March 11, 2011 at 07:11 PM
Last month I posted Susan Landau's testimony before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security on government eavesdropping...schneier From Schneier on Security | March 11, 2011 at 12:06 PM
A programmer installed malware into the Whack-a-Mole arcade game as a form of job security.
It didn't work.
schneier From Schneier on Security | March 9, 2011 at 12:38 PM