From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This< is neat:
The Impressioner consists of a sensor that goes into the lock and sends information back to a computer via USB about the location of the lock's...schneier From Schneier on Security | February 12, 2010 at 12:23 PM
Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...schneier From Schneier on Security | February 11, 2010 at 10:18 PM
Really interesting reading.
Scam-Detective: How did you find victims for your scams?
John: First you need to understand how the gangs work. At the bottom are...schneier From Schneier on Security | February 11, 2010 at 01:19 PM
The iTunes Store Terms and Conditions prohibits it:
Notice, as I read this clause not only are terrorists -- or at least those on terrorist watch lists -- prohibited...schneier From Schneier on Security | February 10, 2010 at 06:39 PM
This appears not to be a joke:
The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...schneier From Schneier on Security | February 9, 2010 at 06:09 PM
Isn't it a bit embarrassing for an "expert on counter-terrorism" to be quoted as saying this?
Bill Tupman, an expert on counter-terrorism from Exeter University...schneier From Schneier on Security | February 9, 2010 at 12:07 PM
Interesting research:
Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...schneier From Schneier on Security | February 8, 2010 at 07:54 PM
Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...schneier From Schneier on Security | February 8, 2010 at 12:03 PM
At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...schneier From Schneier on Security | February 7, 2010 at 02:06 PM
This is unconscionable:
At Tuesday's hearing, Senator Dianne Feinstein, Democrat of California and chairwoman of the Senate Intelligence Committee, asked Mr. Blair...schneier From Schneier on Security | February 5, 2010 at 05:59 PM
Does anyone think this is a good idea?
Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate...schneier From Schneier on Security | February 5, 2010 at 12:02 PM
Security is rarely static. Technology changes both security systems and attackers. But thereschneier From Schneier on Security | February 4, 2010 at 12:35 PM
Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only...schneier From Schneier on Security | February 3, 2010 at 10:07 AM
The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made...schneier From Schneier on Security | February 1, 2010 at 12:34 PM
Ross Anderson reports:
Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified...schneier From Schneier on Security | February 1, 2010 at 12:26 PM