From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie:
Researchers at U.C. Berkeley have discovered that some of the net’s mostfinally...schneier From Schneier on Security | August 15, 2011 at 10:43 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | August 12, 2011 at 09:28 PM
My new book, Liars and Outliers, has a cover.
Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...schneier From Schneier on Security | August 12, 2011 at 07:09 PM
The African crested rat applies tree poison to its fur to make itself more deadly.
The researchers made their discovery after presenting a wild-caught crestedAcokanthera...schneier From Schneier on Security | August 12, 2011 at 04:13 PM
This seems like a really bad idea:
...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...schneier From Schneier on Security | August 12, 2011 at 02:46 PM
Just announced:
Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...schneier From Schneier on Security | August 10, 2011 at 09:11 PM
I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one:
The taxonomy of operational cyber security risks, summarized in Table...schneier From Schneier on Security | August 10, 2011 at 11:39 AM
There's a security story from biology I've used a few times: plants that use chemicals to call in airstrikes by wasps on the herbivores attacking them. This is...schneier From Schneier on Security | August 9, 2011 at 06:09 PM
An article from Salon -- lots of interesting research.
My previous blog post on the topic.schneier From Schneier on Security | August 9, 2011 at 10:45 AM
I've been using the phrase "arms race" to describe the world's militaries' rush into cyberspace for a couple of years now. Here's a good article on the topic that...schneier From Schneier on Security | August 8, 2011 at 11:13 AM
I just can't make this stuff up:
A report of a severed hand found at an Oahu seabird sanctuary has turned out to be dried squid.
Remember: if you see something...schneier From Schneier on Security | August 5, 2011 at 09:24 PM
I admit I don't pay much attention to pencil-and-paper ciphers, so I knew nothing about the Zodiac cipher. Seems it has finally been broken:
The Zodiac Killer...schneier From Schneier on Security | August 5, 2011 at 05:25 PM
I'm not surprised:
The weekly Welt am Sonntag, quoting a police report, said 35 percent of the 730,000 passengers checked by the scanners set off the alarm more...schneier From Schneier on Security | August 5, 2011 at 11:22 AM
Two items on hacking lotteries. The first is about someone who figured out how to spot winner in a scratch-of tic-tac-toe style game, and a daily draw style game...schneier From Schneier on Security | August 4, 2011 at 12:36 PM
Seems that the one-time pad was not first invented by Vernam:
He could plainly see that the document described a technique called the one-time pad fully 35 years...schneier From Schneier on Security | August 3, 2011 at 05:57 PM