From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Neat art project. Another link.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 14, 2012 at 10:44 PM
Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, by Harvey Molotch, Princeton University Press, 278 pages, $35
Security...schneier From Schneier on Security | December 14, 2012 at 06:24 PM
There's a rise in QR codes that point to fraudulent sites. One of the warning signs seems to be a sticker with the code, rather than a code embedded in an advertising...schneier From Schneier on Security | December 13, 2012 at 12:19 PM
Interesting development in forensic analysis:
Comparing the unique pattern of the frequencies on an audio recording with a database that has been logging these...schneier From Schneier on Security | December 12, 2012 at 06:59 PM
This book is available as a free pdf download:
The National Cyber Security Framework Manual provides detailed background information and in-depth theoretical frameworks...schneier From Schneier on Security | December 11, 2012 at 07:03 PM
Excellent article: "How to Shut Down Internets."
First, he describes what just happened in Syria. Then:
Egypt turned off the internet by using the Border Gateway...schneier From Schneier on Security | December 11, 2012 at 12:08 PM
Yet another way two-factor authentication has been bypassed:
For a user to fall prey to Eurograbber, he or she must first be using a computer infected with the...schneier From Schneier on Security | December 10, 2012 at 07:04 PM
Four squids on the cover of this week's Economist represent the four massive (and intrusive) data-driven Internet giants: Google, Facebook, Apple, and Amazon.
Interestingly...schneier From Schneier on Security | December 7, 2012 at 10:04 PM
Not the sort of pairing I normally think of, but:
Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh...schneier From Schneier on Security | December 6, 2012 at 04:59 PM
Another historical cipher, this one from the 1600s, has been cracked:
Senior math major Lucas Mason-Brown, who has done the majority of the decoding, said his...schneier From Schneier on Security | December 5, 2012 at 12:01 PM
It’s a feudal world out there.
Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android...schneier From Schneier on Security | December 3, 2012 at 01:24 PM
It's the size of a softball. No sign of the squid it came from.
As usual, you can also use this squid post to talk about the security stories in the news that...schneier From Schneier on Security | November 30, 2012 at 08:18 PM
Good article on how the Syrian government hacked into the computers of dissidents:
The cyberwar in Syria began with a feint. On Feb. 8, 2011, just as the Arabmanifesto...schneier From Schneier on Security | November 30, 2012 at 11:23 AM
Cash traps and card traps are the new thing:
[Card traps] involve devices that fit over the card acceptance slot and include a razor-edged spring trap that prevents...schneier From Schneier on Security | November 29, 2012 at 10:36 PM
Good article. I agree with the conclusion that the solution isn't to convince people to make better choices, but to change the IT architecture so that it's easier...schneier From Schneier on Security | November 28, 2012 at 11:55 AM