From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Clever:
The burglars broke into their latest store near Paris and drilled a hole in the "pneumatic tube" that siphons money from the checkout to the strong-room...schneier From Schneier on Security | September 28, 2010 at 07:42 PM
This is no surprise:
The people behind the new study start by asking a pretty obvious question: "Why do members of the public disagreeschneier From Schneier on Security | September 28, 2010 at 11:33 AM
It's better to try to isolate parts of a terrorist network than to attempt to destroy it as a whole, at least according to this model:
Vos Fellman explains how...schneier From Schneier on Security | September 27, 2010 at 05:00 PM
It's serious:
The problem lies in the way that ASP.NET, Microsoft's popular Web framework, implements the AES encryption algorithm to protect the integrity ofdemo...schneier From Schneier on Security | September 27, 2010 at 11:51 AM
In an article about Robert Woodward's new book, Obama's Wars, this is listed as one of the book's "disclosures":
A new capability developed by the National Security...schneier From Schneier on Security | September 24, 2010 at 06:23 PM
Extremely persistent browser cookies:
evercookie is a javascript API available that produces extremely persistent cookies in a browser. Its goal is to identify...schneier From Schneier on Security | September 23, 2010 at 04:48 PM
From the AFP:
A publisher has agreed to remove US intelligence details from a memoir by a former army officer in Afghanistan after the Pentagon raised last-minute...schneier From Schneier on Security | September 23, 2010 at 12:19 PM
It's impressive:
The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged...schneier From Schneier on Security | September 22, 2010 at 11:25 AM
New attack:
Criminals across the UK have hacked the new keycard system used to top up pre-payment energy meters and are going door-to-door, dressed as power company...schneier From Schneier on Security | September 21, 2010 at 06:42 PM
I stayed clear of Haystack -- the anonymity program that was going to protect the privacy of dissidents the world over -- because I didn't have enough details about...schneier From Schneier on Security | September 21, 2010 at 11:55 AM
This is interesting:
The study, led by physician Yuval Ran, looked at Israeli combat deaths from 2000 to 2004 and tracked where bullet entries appeared on the...schneier From Schneier on Security | September 20, 2010 at 06:58 PM
This list is from Malcolm Harkins, Intel's chief information security officer, and it's a good one (from a talk at Forrester's Security Forum):
Users want...schneier From Schneier on Security | September 20, 2010 at 09:58 AM
Worth reading:
...what if we chose to accept the fact that every few years, despite all reasonable precautions, some hundreds or thousands of us may die in the...schneier From Schneier on Security | September 18, 2010 at 11:05 AM
The master key for the High-Bandwidth Digital Content Protection standard -- that's what encrypts digital television between set-top boxes and digital televisions...schneier From Schneier on Security | September 17, 2010 at 06:57 PM
DARPA is looking for something that can automatically declassify documents:
I'll be honest: I'm not exactly sure what kind of technological solution you can build...schneier From Schneier on Security | September 17, 2010 at 03:15 PM
Profound analysis from the Department of Homeland Security:
Detailed video obtained through live Web-based camera feeds combined with street-level and direct overhead...schneier From Schneier on Security | September 16, 2010 at 11:34 AM