From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This story is so freaky I'm not even sure I want to post it. But if I don't, you'll all send me the links.
As usual, you can also use this squid post to talk...schneier From Schneier on Security | June 15, 2012 at 09:02 PM
On Sunday, I will be participating in a public discussion about my new book on the FireDogLake website. James Fallows will be the moderator, and I will be answering...schneier From Schneier on Security | June 15, 2012 at 07:55 PM
From "CNN national security analyst" Peter Bergen:
Few Americans harbor irrational fears about being killed by a lightning bolt. Abu Yahya al-Libi's death on Monday...schneier From Schneier on Security | June 15, 2012 at 11:51 AM
Interesting article:
In the case of that student, the professor in the course had tried to prevent cheating by using a testing system that pulled questions at...schneier From Schneier on Security | June 14, 2012 at 05:27 PM
We're in the early years of a cyberwar arms race. It's expensive, it's destabilizing, and it threatens the very fabric of the Internet we use every day. Cyberwar...schneier From Schneier on Security | June 14, 2012 at 11:40 AM
In 2008 I wrote about the security mindset and how difficult it is to teach. Two professors teaching a cyberwarfare class gave an exam where they expected their...schneier From Schneier on Security | June 13, 2012 at 05:08 PM
USA Today article:
Most troubling to authorities is the sophistication of the forgeries: Digital holograms are replicated, PVC plastic identical to that found...schneier From Schneier on Security | June 13, 2012 at 11:45 AM
There have been a bunch of stories about employers demanding passwords to social networking sites, like Facebook, from prospective employees, and several states...schneier From Schneier on Security | June 12, 2012 at 10:09 AM
New paper by Peter P. Swire -- "From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud":
Abstract: This...schneier From Schneier on Security | June 11, 2012 at 11:36 AM
Baby squid larvae are transparent after they hatch, so you can see the chromataphores (color control mechanisms) developing after a few days.
As usual, you can...schneier From Schneier on Security | June 8, 2012 at 09:28 PM
This is an interesting essay -- it claims to be the first in a series -- that looks at the rise of "homeland security" as a catastrophic consequence of the 9/11...schneier From Schneier on Security | June 8, 2012 at 11:43 AM
Look at the last sentence in this article on hotel cleanliness:
"I relate this to homeland security. We are not any safer, but many people believe that we are,"...schneier From Schneier on Security | June 7, 2012 at 11:15 AM
Ghostery is a Firefox plug-in that tracks who is tracking your browsing habits in cyberspace. Here's a TED talk by Gary Kovacs, the CEO of Mozilla Corp., on it...schneier From Schneier on Security | June 6, 2012 at 02:36 PM
I'm at the Fifth Interdisciplinary Workshop on Security and Human Behavior, SHB 2012. Google is hosting this year, at its offices in lower Manhattan.
SHB is an...schneier From Schneier on Security | June 5, 2012 at 06:16 PM
This is worth reading, for the insights it provides on how a country goes about monitoring its citizens in the information age: a combination of targeted attacks...schneier From Schneier on Security | June 5, 2012 at 11:07 AM
Interesting article:
The reliability of witness testimony is a vastly complex subject, but legal scholars and forensic psychologists say it's possible to extract...schneier From Schneier on Security | June 4, 2012 at 11:36 AM
Flame seems to be another military-grade cyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers...schneier From Schneier on Security | June 4, 2012 at 11:21 AM
Interesting:
Cephalopods - squid, cuttlefish and octopuses - change colour by using tiny muscles in their skins to stretch out small sacs of black colouration....schneier From Schneier on Security | June 1, 2012 at 09:40 PM
Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...schneier From Schneier on Security | June 1, 2012 at 11:48 AM