From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
An article from The Economist makes a point that I have been thinking about for a while: the modern technology makes life harder for spies, not easier. It used...schneier From Schneier on Security | July 26, 2010 at 11:12 AM
Where do these TV shows come from?
Follows the adventures of the Cuylers, an impoverished and dysfunctional family of anthropomorphic, air-breathing, redneck squids...schneier From Schneier on Security | July 23, 2010 at 09:19 PM
The Washington Post has published a phenomenal piece of investigative journalism: a long, detailed, and very interesting expose on the U.S. intelligence industry...schneier From Schneier on Security | July 23, 2010 at 05:46 PM
Stuxnet is a new Internet worm that specifically targets Siemens WinCC SCADA systems: used to control production at industrial plants such as oil rigs, refineries...schneier From Schneier on Security | July 23, 2010 at 01:59 PM
Interesting:
The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...schneier From Schneier on Security | July 22, 2010 at 11:41 AM
Two interesting research papers on website password policies.
"Where Do Security Policies Come From?":
Abstract: We examine the password policies of 75 different...schneier From Schneier on Security | July 20, 2010 at 06:52 PM
From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...schneier From Schneier on Security | July 20, 2010 at 11:43 AM
From Wired News:
The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...schneier From Schneier on Security | July 19, 2010 at 06:11 PM
Symbiotic relationship between the Hawaiian bobtail squid and bioluminescent bacteria, with bonus security implications.
schneier From Schneier on Security | July 16, 2010 at 09:34 PM
Someone claims to have reverse-engineered Skype's proprietary encryption protocols, and has published pieces of it.
If the crypto is good, this is less of a big...schneier From Schneier on Security | July 16, 2010 at 05:08 PM
In what creepy back room do they come up with these names?
The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults...schneier From Schneier on Security | July 16, 2010 at 10:19 AM
This is interesting:
Some of the scenarios where we have installed video analytics for our clients include:
to detect someone walking in an area of their yard...schneier From Schneier on Security | July 14, 2010 at 05:54 PM
It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...schneier From Schneier on Security | July 14, 2010 at 11:51 AM
From 1955, intended as humor:
In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...schneier From Schneier on Security | July 13, 2010 at 05:42 PM