From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Worth reading:
Those with either an engineering or management background are aware that one cannot optimize everything at once schneier From Schneier on Security | November 2, 2010 at 10:51 AM
I had never heard the term "control fraud" before:
Control fraud theory was developed in the savings and loan debacle. It explained that the person controlling...schneier From Schneier on Security | November 1, 2010 at 11:02 AM
From the Wall Street Journal:
Take "stranger danger," the classic Halloween horror. Even when I was a kid, back in the "Bewitched" and "Brady Bunch" costume era...schneier From Schneier on Security | October 31, 2010 at 03:02 PM
The New York Times writes: "Despite the increased scrutiny of people and luggage on passenger planes since 9/11, there are far fewer safeguards for packages and...schneier From Schneier on Security | October 30, 2010 at 02:41 PM
Okay, it's not TED. It's one of the independent regional TED events: TEDxPSU. My talk was "Reconceptualizing Security," a condensation of the hour-long talk into...schneier From Schneier on Security | October 29, 2010 at 07:31 PM
They're not worth it:
In seven years, New Orleans' crime camera program has yielded six indictments: three for crimes caught on video and three for bribes and...schneier From Schneier on Security | October 28, 2010 at 11:09 AM
Old -- but recently released -- document discussing the bugging of the Russian embassy in 1940. The document also mentions bugging the embassies of France, Germany...schneier From Schneier on Security | October 27, 2010 at 08:24 PM
Firesheep is a new Firefox plugin that makes it easy for you to hijack other people's social network connections. Basically, Facebook authenticates clients with...schneier From Schneier on Security | October 27, 2010 at 12:53 PM
It's a long list. These items are not online; they're at the National Archives and Records Administration in College Park, MD. You can either ask for copies by...schneier From Schneier on Security | October 25, 2010 at 11:21 AM
Really:
While the notion that a few animals produce polarization signals and use them in communication is not new, Mschneier From Schneier on Security | October 22, 2010 at 09:31 PM
Once a user has logged into FaceTime, anyone with access to the machine can change the user's Apple ID password without knowing the old password.
schneier From Schneier on Security | October 22, 2010 at 10:45 AM
Clever:
Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles...schneier From Schneier on Security | October 21, 2010 at 07:07 PM
I am the program chair for WEIS 2011, which is to be held next June in Washington, DC.
Submissions are due at the end of February.
Please forward and repost the...schneier From Schneier on Security | October 21, 2010 at 12:11 AM
This isn't good:
Intelligent Integration Systems (IISi), a small Boston-based software development firm, alleges that their Geospatial Toolkit and Extended SQL...schneier From Schneier on Security | October 20, 2010 at 12:21 PM
Ha!
When he's out and about near his Denver home, former Broncos quarterback John Elway has come up with a novel way to travel incognitoschneier From Schneier on Security | October 19, 2010 at 12:34 PM
This is clever:
The tool is called PinDr0p, and works by analysing the various characteristic noise artifacts left in audio by the different types of voice network...schneier From Schneier on Security | October 18, 2010 at 11:23 AM