From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The University of Pittsburgh has been the recipient of 50 bomb threats in the past two months (over 30 during the last week). Each time, the university evacuates...schneier From Schneier on Security | April 12, 2012 at 06:34 PM
Interesting video of Brian Snow speaking from last November. (Brian used to be the Technical Director of NSA's Information Assurance Directorate.) About a year...schneier From Schneier on Security | April 12, 2012 at 11:38 AM
I read this a couple of months ago, and I'm still not sure what I think about it. It's definitely of the most thought-provoking essays I've read this year.
According...schneier From Schneier on Security | April 11, 2012 at 06:25 PM
Usually I don't bother posting random stories about dumb or inconsistent airport security measures. But this one is particularly interesting:
"Sir, your trousers...schneier From Schneier on Security | April 11, 2012 at 02:57 PM
Good article debunking the myth that young people don't care about privacy on the Intenet.
Most kids are well aware of risks, and make "fairly sophisticated" decisions...schneier From Schneier on Security | April 10, 2012 at 03:21 PM
The New York Times tries to make sense of the TSA's policies on computers. Why do you have to take your tiny laptop out of your bag, but not your iPad? Their...schneier From Schneier on Security | April 9, 2012 at 12:45 PM
Happy Easter.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 6, 2012 at 09:14 PM
The National Academies Press has published Crisis Standards of Care: A Systems Framework for Catastrophic Disaster Response.
When a nation or region prepares...schneier From Schneier on Security | April 6, 2012 at 04:03 PM
Okay, so he doesn't use that term. But he explains how a magician's inherent ability to detect deception can be useful to science.
We can't make magicians out...schneier From Schneier on Security | April 6, 2012 at 10:35 AM
This is the most intelligent thing I've read about the JetBlue incident where a pilot had a mental breakdown in the cockpit:
For decades, public safety officials...schneier From Schneier on Security | April 5, 2012 at 11:19 AM
Good article on the current battle for Internet governance:
The War for the Internet was inevitable -- a time bomb built into its creation. The war grows out of...schneier From Schneier on Security | April 4, 2012 at 05:34 PM
Symantec deliberately "lost" a bunch of smart phones with tracking software on them, just to see what would happen:
Some 43 percent of finders clicked on an app...schneier From Schneier on Security | April 4, 2012 at 11:07 AM
Turns out the password can be easily bypassed:
XRY works by first jailbreaking the handset. According to Micro Systemation, no schneier From Schneier on Security | April 3, 2012 at 07:01 PM
Paul Ceglia's lawsuit against Facebook is fascinating, but that's not the point of this blog post. As part of the case, there are allegations that documents and...schneier From Schneier on Security | April 3, 2012 at 11:53 AM
This article talks about legitimate companies buying zero-day exploits, including the fact that "an undisclosed U.S. government contractor recently paid $250,000...schneier From Schneier on Security | April 2, 2012 at 12:56 PM
Interesting research:
The squid use two closely spaced organs called statocysts to sense sound.
"I think of a statocyst as an inside-out tennis ball," explains...schneier From Schneier on Security | March 30, 2012 at 09:28 PM
Normally I just delete these as spam, but this summer program for graduate students 1) looks interesting, and 2) has some scholarship money available. schneier From Schneier on Security | March 29, 2012 at 07:07 PM
As I posted previously, I have been debating former TSA Administrator Kip Hawley on the Economist website. I didn't bother reposting my opening statement and rebuttal...schneier From Schneier on Security | March 29, 2012 at 11:53 AM
Last weekend was the 2012 SHARCS (Special-Purpose Hardware for Attacking Cryptographic Systems) conference. The presentations are online.schneier From Schneier on Security | March 28, 2012 at 11:05 AM