From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Chilling:
How do most wrongful convictions come about?
The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...schneier From Schneier on Security | August 30, 2010 at 05:05 PM
Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...schneier From Schneier on Security | August 30, 2010 at 10:31 AM
Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...schneier From Schneier on Security | August 27, 2010 at 05:47 PM
Full-body scanners in roving vans:
American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...schneier From Schneier on Security | August 27, 2010 at 12:58 PM
Research paper: Detecting Deceptive Discussions in Conference Calls, by David F. Larcker and Anastasia A. Zakolyukina.
Abstract: We estimate classification models...schneier From Schneier on Security | August 26, 2010 at 11:15 AM
From danah boyd:
Carmen is engaging in social steganography. She's hiding information in plain sight, creating a message that can be read in one way by those who...schneier From Schneier on Security | August 25, 2010 at 11:20 AM
And you thought fingerprints were intrusive.
The Wright State Research Institute is developing a ground-breaking system that would scan the skeletal structures...schneier From Schneier on Security | August 24, 2010 at 11:56 AM
This is a first, I think:
The airline's central computer which registered technical problems on planes was infected by Trojans at the time of the fatal crash and...schneier From Schneier on Security | August 23, 2010 at 11:03 AM
Who knew?
"Hulse was shooting with burst mode on his camera, so I know exactly what the interval is between the frames and I can calculate velocity of squid flying...schneier From Schneier on Security | August 20, 2010 at 09:02 PM
Intel McAfee.
It's another example of a large non-security company buying a security company. I've been talking about this sort of thing for two and a half years...schneier From Schneier on Security | August 19, 2010 at 04:26 PM
Good essay by Seth Godin:
We pay the fear tax every time we spend time or money seeking reassurance. We pay it twice when the act of seeking that reassurance actually...schneier From Schneier on Security | August 18, 2010 at 08:48 PM
The Crypto 2010 Conference is going on right now at the University of California, Santa Barbara. Springer-Verlag publishes the proceedings, but they're available...schneier From Schneier on Security | August 17, 2010 at 05:29 PM
Still minor, but this kind of thing is only going to get worse:
The new research shows that other systems in the vehicle are similarly insecure. The tire pressure...schneier From Schneier on Security | August 17, 2010 at 11:42 AM
In seconds.
Garage doors with automatic openers have always seemed like a lot of security theater to me.
schneier From Schneier on Security | August 16, 2010 at 11:51 AM
It wasn't me:
A hardened computer hacker has been arrested on suspicion of writing a computer virus that systematically destroys all the files on victims' PCs...schneier From Schneier on Security | August 13, 2010 at 09:23 PM
Clever attack.
After researching how gift cards work, Zepeda purchased a magnetic card reader online, began stealing blank gift cards, on display for purchase,...schneier From Schneier on Security | August 13, 2010 at 12:36 PM
"Smudge Attacks on Smartphone Touch Screens":
Abstract: Touch screens are an increasingly common feature on personal computing devices, especially smartphones...schneier From Schneier on Security | August 12, 2010 at 11:48 AM
Facebook Privacy Settings: Who Cares?" by danah boyd and Eszter Hargittai.
Abstract: With over 500 million users, the decisions that Facebook makes about its...schneier From Schneier on Security | August 11, 2010 at 11:00 AM