From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This isn't phishing; it's not even spear phishing. It's laser-guided precision phishing:
One of the leaked diplomatic cables referred to one attack via emailwrote...schneier From Schneier on Security | March 1, 2013 at 11:05 AM
Recently, Elon Musk and the New York Times took to Twitter and the Internet to argue the data -- and their grievances -- over a failed road test and car review....schneier From Schneier on Security | February 28, 2013 at 08:40 PM
Three brazen robberies are in the news this week.
The first was a theft at a small museum of gold nuggets worth $750,000:
Police said the daring heist happened...schneier From Schneier on Security | February 28, 2013 at 12:35 PM
Obituary here. His 1967 book, Privacy and Freedom, almost single-handedly created modern privacy law. schneier From Schneier on Security | February 27, 2013 at 07:26 PM
Good summary list. It's not directly about security, but it's all fundamentally about security. Any real-world security system is inherently complex. I wrote...schneier From Schneier on Security | February 27, 2013 at 01:09 PM
Someone has analyzed the security mistakes in the Battle of Hoth, from the movie The Empire Strikes Back.schneier From Schneier on Security | February 26, 2013 at 07:38 PM
I would have liked to participate in this hearing: Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency: "Assessing DHS 10 Years"...schneier From Schneier on Security | February 26, 2013 at 01:10 PM
I'll be speaking twice at the RSA Conference this year. I'm giving a solo talk Tuesday at 1:00, and participating in a debate about training Wednesday at noon....schneier From Schneier on Security | February 25, 2013 at 07:49 PM
The Montréal Review asked me to write an essay about my latest book. Not much that regular readers haven't seen before.schneier From Schneier on Security | February 25, 2013 at 11:52 AM
Funny.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 22, 2013 at 10:38 PM
I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.
schneier From Schneier on Security | February 22, 2013 at 08:21 PM
As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...schneier From Schneier on Security | February 22, 2013 at 05:12 PM
This is interesting:
In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...schneier From Schneier on Security | February 22, 2013 at 12:03 PM
Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency...schneier From Schneier on Security | February 21, 2013 at 06:54 PM
Interesting research (full article is behind a paywall):
Abstract: Older adults are disproportionately vulnerable to fraud, and federal agencies have speculated...schneier From Schneier on Security | February 21, 2013 at 01:24 PM
How international soccer matches are fixed.
Right now, Dan Tan's programmers are busy reverse-engineering the safeguards of online betting houses. About $3 billion...schneier From Schneier on Security | February 20, 2013 at 01:29 PM
There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...schneier From Schneier on Security | February 19, 2013 at 06:52 PM
After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...schneier From Schneier on Security | February 18, 2013 at 07:43 PM