From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
For technology that was supposed to ignore borders, bring the world closer together, and sidestep the influence of national governments the Internet is fostering...schneier From Schneier on Security | March 14, 2013 at 11:11 AM
Click on the "Establishing secure connection" link at the top of this page. It's a Wells Fargo page that displays a progress bar with a bunch of security phrases...schneier From Schneier on Security | March 13, 2013 at 06:30 PM
Nice work:
All current Cisco IP phones, including the ones seen on desks in the White House and aboard Air Force One, have a vulnerability that allows hackers...schneier From Schneier on Security | March 12, 2013 at 06:43 PM
Interesting essay:
Surveillance is part of the system of control. "The more surveillance, the more control" is the majority belief amongst the ruling elites....schneier From Schneier on Security | March 12, 2013 at 11:45 AM
Hats:
De Blowitz was staying at the Kaiserhof. Each day his confederate went there for lunch and dinner. The two never acknowledged one another, but they hung...schneier From Schneier on Security | March 11, 2013 at 05:58 PM
I worry that comments about the value of software security made at the RSA Conference last week will be taken out of context. John Viega did not say that software...schneier From Schneier on Security | March 11, 2013 at 11:12 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 8, 2013 at 10:06 PM
The second edition of Ross Anderson's fantastic book, Security Engineering, is now free online. Required reading for any security engineer.schneier From Schneier on Security | March 8, 2013 at 06:08 PM
Google Docs is being used for phishing. Oxford University felt that it had to block the service because Google isn't responding to takedown requests quickly enough...schneier From Schneier on Security | March 8, 2013 at 12:23 PM
Good article on "Stingrays," which the FBI uses to monitor cell phone data. Basically, they trick the phone into joining a fake network. And, since cell phones...schneier From Schneier on Security | March 7, 2013 at 07:39 PM
Interesting discussion on browser security from Communications of the ACM. Also, an article on browser and web privacy from the same issue.schneier From Schneier on Security | March 7, 2013 at 12:45 PM
A new book reveals details about the NSA's Ragtime surveillance program:
A book published earlier this month, "Deep State: Inside the Government Secrecy Industry...schneier From Schneier on Security | March 6, 2013 at 07:24 PM
Interesting:
3 – Spreading the reflective pieces of glass on a car or on the roof of the building.
4 – Placing a group of skilled snipers to hunt the drone, especially...schneier From Schneier on Security | March 6, 2013 at 12:50 PM
Marcus Ranum has an interesting screed on "booth babes" in the RSA Conference exhibition hall:
I'm not making a moral argument about sexism in our industry orsame...schneier From Schneier on Security | March 5, 2013 at 07:58 PM
It's a new day for the New York Police Department, with technology increasingly informing the way cops do their jobs. With innovation comes new possibilities but...schneier From Schneier on Security | March 5, 2013 at 12:28 PM
I hadn't heard of this one before. In New Zealand, people viewing adult websites -- it's unclear whether these are honeypot sites, or malware that notices thepop...schneier From Schneier on Security | March 4, 2013 at 08:04 PM
One of the problems with motivating proper security behavior within an organization is that the incentives are all wrong. It doesn't matter how much management...schneier From Schneier on Security | March 4, 2013 at 12:38 PM
Another.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 1, 2013 at 10:36 PM