From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm really getting tired of stories like this:
Computer disks and USB sticks were dropped in parking lots of government buildings and private contractors, andcourse...schneier From Schneier on Security | June 29, 2011 at 02:13 PM
There's some great data on common iPhone passwords. I'm sure the results also apply to banking PINs.schneier From Schneier on Security | June 27, 2011 at 11:15 AM
Here's someone who is selling positive feedback on eBay:
Hello, for sale is a picture of a tree. This tree is an original and was taken by me. I have gotten...schneier From Schneier on Security | June 24, 2011 at 06:59 PM
It's a new world:
An armed Valdez, 36, held a woman hostage at a motel in a tense 16-hour, overnight standoff with SWAT teams, all while finding time to keep his...schneier From Schneier on Security | June 24, 2011 at 04:40 PM
AppFence is a technology -- with a working prototype -- that protects personal information on smart phones. It does this by either substituting innocuous information...schneier From Schneier on Security | June 24, 2011 at 11:37 AM
Protecting against insiders is hard.
Kluger and two accomplices -- a Wall Street trader and a mortgage broker -- allegedly stole and traded on material nonpublic...schneier From Schneier on Security | June 23, 2011 at 11:29 AM
Many of our informal security systems involve convincing others to do what we want them to. Here's a theory that says human reasoning evolved not as a tool tohere...schneier From Schneier on Security | June 22, 2011 at 06:40 PM
As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...schneier From Schneier on Security | June 21, 2011 at 04:20 PM
Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research.
Abstract: Much of the information we have on cyber-crime...schneier From Schneier on Security | June 21, 2011 at 10:58 AM
New paper: "Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise":
Current aviation...schneier From Schneier on Security | June 20, 2011 at 12:01 PM
I'm at SHB 2011, the fourth Interdisciplinary Workshop on Security and Human Behavior, at Carnegie Mellon University. This is a two-day invitational gathering of...schneier From Schneier on Security | June 18, 2011 at 06:06 PM
One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...schneier From Schneier on Security | June 17, 2011 at 05:09 PM