From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's big news in the world of giant squid:
Researchers initially thought that this strange grouping of 45-foot-long marine reptiles had either died en masse...schneier From Schneier on Security | October 14, 2011 at 09:07 PM
I find this fascinating:
A central California man has been arrested for possession of child pornography, thanks to a tip from burglars who robbed the man's property...schneier From Schneier on Security | October 14, 2011 at 05:34 PM
The Chaos Computer Club has disassembled and analyzed the Trojan used by the German police for legal intercept. In its default mode, it takes regular screenshots...schneier From Schneier on Security | October 13, 2011 at 11:03 AM
Nice research:
Abstract: We report a novel attack on two CAPTCHAs that have been widely deployed on the Internet, one being Google's home design and the other...schneier From Schneier on Security | October 12, 2011 at 11:57 AM
You'd think we would be more careful than this:
A computer virus has infected the cockpits of Americaschneier From Schneier on Security | October 10, 2011 at 11:38 AM
Humboldt squid are washing up on beaches across Southern California. Seems like it's no big deal; the squid just swam too close to shore.schneier From Schneier on Security | October 7, 2011 at 09:51 PM
Related to this blog post from Wednesday, here's a paper that looks at security seals on voting machines.
Andrew W. Appel, "Security Seals on Voting Machines:...schneier From Schneier on Security | October 7, 2011 at 06:11 PM
From a review of Susan Landau's Surveillance or Security?:
To catch up with the new technologies of malfeasance, FBI director Robert Mueller traveled to Silicon...schneier From Schneier on Security | October 7, 2011 at 11:01 AM
Last weekend, I completely reframed the book. I realized that the book isn't about security. It's about trust. I'm writing about how society induces people to...schneier From Schneier on Security | October 6, 2011 at 12:38 AM
This is both news and not news:
Indeed, the Argonne team's attack required no modification, reprogramming, or even knowledge, of the voting machine's proprietary...schneier From Schneier on Security | October 5, 2011 at 11:58 AM
October is National Cybersecurity Awareness Month, sponsored by the Department of Homeland Security. The website has some sample things you can do to to celebrate...schneier From Schneier on Security | October 4, 2011 at 11:31 AM
A great find:
In his 1956 short story, "Let's Get Together," Isaac Asimov describes security measures proposed to counter a terrorist threat:
"Consider further...schneier From Schneier on Security | October 3, 2011 at 06:20 PM
Custom HTC firmware breaks standard permissions and allows rogue apps to access location, address book, and account info without authorization.schneier From Schneier on Security | October 3, 2011 at 11:35 AM
An analysis of extensions to the Chrome browser shows that 25% of them are insecure:
We reviewed 100 Chrome extensions and found that 27 of the 100 extensions...schneier From Schneier on Security | September 29, 2011 at 11:59 AM