From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
India is writing its own operating system so it doesn't have to rely on Western technology:
India's Defence Research and Development Organisation (DRDO) wants...schneier From Schneier on Security | October 15, 2010 at 03:44 PM
Interesting new technology.
Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...schneier From Schneier on Security | October 14, 2010 at 05:10 PM
Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...schneier From Schneier on Security | October 14, 2010 at 11:35 AM
They're tracking a college student in Silicon Valley. He's 20, partially Egyptian, and studying marketing at Mission College. He found the tracking device attached...schneier From Schneier on Security | October 13, 2010 at 11:20 AM
Remember the Mahmoud al-Mabhouh assassination last January? The police identified 30 suspects, but haven't been able to find any of them.
Police spent about 10...schneier From Schneier on Security | October 12, 2010 at 11:12 AM
From Slate:
We do nothing, first and foremost, because there is nothing we can do. Unless the State Department gets specificschneier From Schneier on Security | October 8, 2010 at 05:49 PM
Sounds like it was easy:
Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer...schneier From Schneier on Security | October 8, 2010 at 11:23 AM
From the Journal of Homeland Security and Emergency Management: "Politics or Risks? An Analysis of Homeland Security Grant Allocations to the States."
Abstract...schneier From Schneier on Security | October 7, 2010 at 12:03 PM
Computer security experts are often surprised at which stories get picked up by the mainstream media. Sometimes it makes no sense. Why this particular data breach...schneier From Schneier on Security | October 7, 2010 at 10:16 AM
This will help some.
At least two rival systems plan to put unique codes on packages containing antimalarials and other medications. Buyers will be able to text...schneier From Schneier on Security | October 6, 2010 at 11:59 AM
New research: "Attacks and Design of Image Recognition CAPTCHAs."
Abstract. We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper...schneier From Schneier on Security | October 5, 2010 at 12:22 PM
I regularly say that security decisions are primarily made for non-security reasons. This article about the placement of sky marshals on airplanes is an excellent...schneier From Schneier on Security | October 4, 2010 at 06:55 PM
Not their online behavior at work, but their online behavior in life.
Using automation software that slogs through Facebook, Twitter, Flickr, YouTube, LinkedIn...schneier From Schneier on Security | October 4, 2010 at 11:31 AM
Okay, so this isn't a normal blog post.
It's not about security.
I've been playing doumbek with a band at the Minneapolis Renaissance Festival called Brother...schneier From Schneier on Security | October 1, 2010 at 07:43 PM
During the cyberwar debate a few months ago, I said this:
If we frame this discussion as a war discussion, then what you do when there's a threat of war is you...schneier From Schneier on Security | October 1, 2010 at 03:19 PM
This is a list of master's theses from the Naval Postgraduate School's Center for Homeland Defense and Security, this year.
Some interesting stuff in there....schneier From Schneier on Security | October 1, 2010 at 11:34 AM
On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet. Technologies...schneier From Schneier on Security | September 30, 2010 at 11:02 AM