From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The average American commits three felonies a day: the title of a new book by Harvey Silverglate. More specifically, the problem is the intersection of vague laws...schneier From Schneier on Security | September 29, 2009 at 06:08 PM
Turns out "gaydar" can be automated:
Using data from the social network Facebook, they made a striking discovery: just by looking at a person's online friends,...schneier From Schneier on Security | September 29, 2009 at 12:13 PM
In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something...schneier From Schneier on Security | September 28, 2009 at 06:34 PM
Nobody tell the TSA, but last month someone tried to assassinate a Saudi prince by exploding a bomb stuffed in his rectum. He pretended to be a repentant militant...schneier From Schneier on Security | September 28, 2009 at 11:19 AM
First one sighted in the Gulf since 1954:
The new specimen, weighing 103 pounds, was found during a preliminary survey of the Gulf during which scientists hope...schneier From Schneier on Security | September 25, 2009 at 06:04 PM
Texas Instruments' calculators use RSA digital signatures to authenticate any updates to their operating system. Unfortunately, their signing keys are too short...schneier From Schneier on Security | September 25, 2009 at 11:17 AM
It's not just hackers who steal financial and medical information:
Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invitedSony...schneier From Schneier on Security | September 24, 2009 at 11:37 AM
I already blogged about this; there's more information in this new article:
Included in the items the German army allowed humanitarian groups to distribute in...schneier From Schneier on Security | September 23, 2009 at 06:43 PM
This is a good thing:
An Illinois district court has allowed a couple to sue their bank on the novel grounds that it may have failed to sufficiently secure their...Schneier From Schneier on Security | September 23, 2009 at 11:00 AM
Back in 2005, I wrote about the failure of two-factor authentication to mitigate banking fraud:
Here are two new active attacks we're starting to see:
Man-in-the...schneier From Schneier on Security | September 22, 2009 at 11:39 AM
This is an important development:
Shor's algorithm was first demonstrated in a computing system based on nuclear magnetic resonance -- manipulating molecules in...schneier From Schneier on Security | September 22, 2009 at 11:01 AM
Interesting:
For nine months, Eagle's team recorded data from the phones of 94 students and staff at MIT. By using blue-tooth technology and phone masts, theyabstract...schneier From Schneier on Security | September 21, 2009 at 06:41 PM
Good essay on "terrorist havens" -- like Afghanistan -- and why they're not as big a worry as some maintain:
Rationales for maintaining the counterinsurgency in...schneier From Schneier on Security | September 21, 2009 at 11:46 AM
I wrote about the DHS's color-coded threat alert system in 2003, in Beyond Fear:
The color-coded threat alerts issued by the Department of Homeland Security are...schneier From Schneier on Security | September 18, 2009 at 11:45 AM
Using a 3D printer. Impressive.
At the end of the day he talked the officers into trying the key on their handcuffs and schneier From Schneier on Security | September 16, 2009 at 02:00 PM
Skein is one of the 14 SHA-3 candidates chosen by NIST to advance to the second round. As part of the process, NIST allowed the algorithm designers to implement...schneier From Schneier on Security | September 15, 2009 at 11:10 AM
Back in 2002, science fiction author Robert J. Sawyer wrote an essay about the trade-off between privacy and security, and came out in favor of less privacy. I...schneier From Schneier on Security | September 14, 2009 at 09:20 AM