From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This FBI surveillance device, designed to be attached to a car, has been taken apart and analyzed.
A recent ruling by the 9th U.S. Circuit Court of Appeals affirms...schneier From Schneier on Security | May 16, 2011 at 11:31 AM
These are what I get for giving interviews when I'm in a bad mood. For the record, I think Sony did a terrible job with its customers' security. I also think...schneier From Schneier on Security | May 13, 2011 at 04:29 PM
This is a pretty scary criminal tactic from Turkey. Burglars dress up as doctors, and ring doorbells handing out pills under some pretense or another. They're...schneier From Schneier on Security | May 13, 2011 at 12:11 PM
The stealing of hotel towels isn't a big problem in the scheme of world problems, but it can be expensive for hotels. Sure, we have moral prohibitions againstmore...schneier From Schneier on Security | May 11, 2011 at 04:01 PM
This blog post by Richard Clayton is worth reading.
If you have more time, there's 238-page report and a 31-page executive summary.
schneier From Schneier on Security | May 11, 2011 at 11:12 AM
Interesting:
The well-preserved tally stick was used in the Middle Ages to count the debts owed by the holder in a time when most people were unable to read or...schneier From Schneier on Security | May 10, 2011 at 06:47 PM
Good comment:
"We're moving into an era of 'steal everything'," said David Emm, a senior security researcher for Kaspersky Labs.
He believes that cyber criminals...schneier From Schneier on Security | May 10, 2011 at 11:20 AM
This hack was conducted as a research project. It's unlikely it's being done in the wild:
In one attack, Wang and colleagues used a plug-in for the Firefox web...schneier From Schneier on Security | May 9, 2011 at 06:50 PM
Three months ago, I announced that I was writing a book on why security exists in human societies. This is basically the book's thesis statement:
All complex...schneier From Schneier on Security | May 9, 2011 at 12:02 PM
A scary development in rootkits:
Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...schneier From Schneier on Security | May 6, 2011 at 05:32 PM
Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.
schneier From Schneier on Security | May 6, 2011 at 12:01 PM
Exactly how did they confirm it was Bin Laden's body?
Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...schneier From Schneier on Security | May 5, 2011 at 05:52 PM
It's not that the risk is greater, it's that the fear is greater. Data from New York:
There were 10,566 reports of suspicious objects across the five boroughs...schneier From Schneier on Security | May 5, 2011 at 11:43 AM
Wouldn't it be great if this were not a joke: the security contingency that was in place in the event that Kate Middleton tried to run away just before the wedding...schneier From Schneier on Security | May 4, 2011 at 05:15 PM
This is interesting:
When World Kitchen took over the Pyrex brand, it started making more products out of prestressed soda-lime glass instead of borosilicate....schneier From Schneier on Security | May 4, 2011 at 11:40 AM
According to this article, students are no longer learning how to write in cursive. And, if they are learning it, they're forgetting how. Certainly the ubiquity...schneier From Schneier on Security | May 3, 2011 at 07:25 PM