From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...schneier From Schneier on Security | January 9, 2012 at 06:55 PM
Have you wondered what $1.2 billion in airport security gets you? The TSA has compiled its own "Top 10 Good Catches of 2011":
10) Snakes, turtles, and birds were...schneier From Schneier on Security | January 9, 2012 at 12:00 PM
It's a serious vulnerability. Note that this is the research that was mistakenly reported as allowing hackers to set your printer on fire.
Here's a list of all...schneier From Schneier on Security | January 6, 2012 at 07:50 PM
The author of this article notices that it's often easy to guess a cell phone PIN because of smudge marks on the screen. Those smudge marks indicate the four PIN...schneier From Schneier on Security | January 6, 2012 at 12:30 PM
The Liars and Outliers webpage is live. On it you can find links to order both paper and e-book copies from a variety of online retailers, and signed copies directly...schneier From Schneier on Security | January 5, 2012 at 07:39 PM
The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...schneier From Schneier on Security | January 4, 2012 at 02:37 PM
Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56schneier From Schneier on Security | January 2, 2012 at 06:33 PM
Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...schneier From Schneier on Security | January 2, 2012 at 12:15 PM
Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...schneier From Schneier on Security | December 30, 2011 at 12:11 PM
There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...schneier From Schneier on Security | December 29, 2011 at 07:58 PM
A great story:
Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...schneier From Schneier on Security | December 29, 2011 at 03:47 PM
Here's a new biometric: how you sit:
...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...schneier From Schneier on Security | December 28, 2011 at 05:40 PM
Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.schneier From Schneier on Security | December 27, 2011 at 12:22 PM
Cupcakes deemed security threat:
Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...schneier From Schneier on Security | December 25, 2011 at 04:28 PM
It's a metaphor that will not die.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 24, 2011 at 12:10 AM
In 1997, I wrote about something called a chosen-protocol attack, where an attacker can use one protocol to break another. Here's an example of the same thing...schneier From Schneier on Security | December 20, 2011 at 12:24 PM