From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...schneier From Schneier on Security | June 28, 2010 at 09:02 AM
"10 Everyday Items Hackers Are Targeting Right Now"
5. Your Blender. Yes, Your Blender
That's right: your blender is under attack! Most mixers are self-contained...schneier From Schneier on Security | June 25, 2010 at 06:47 PM
Interesting:
The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...schneier From Schneier on Security | June 25, 2010 at 11:53 AM
It's operational:
The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...schneier From Schneier on Security | June 24, 2010 at 06:21 PM
Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker.
Assange is an international trafficker, of sorts. He and his colleagues collect...schneier From Schneier on Security | June 24, 2010 at 06:13 PM
Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival:
No...schneier From Schneier on Security | June 23, 2010 at 06:16 PM
In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote:
"High-tech, low-tech, we can't...schneier From Schneier on Security | June 23, 2010 at 11:00 AM
The New York Times Room for Debate blog did the topic: "Do We Tolerate Too Many Traffic Deaths?"
schneier From Schneier on Security | June 22, 2010 at 04:50 PM
Interesting:
TM skimmers -- or fraud devices that criminals attach to cash machines in a bid to steal and ultimately clone customer bank card data -- are marketed...schneier From Schneier on Security | June 22, 2010 at 11:49 AM
If you give people enough incentive to cheat, people will cheat:
Of all the forms of academic cheating, none may be as startling as educators tampering with children's...schneier From Schneier on Security | June 21, 2010 at 05:01 PM
I didn't write about the recent security breach that disclosed tens of thousands of e-mail addresses and ICC-IDs of iPad users because, well, there was nothingwere...schneier From Schneier on Security | June 21, 2010 at 10:27 AM
This is cool technology from HP:
Each printer with the ePrint capability will be assigned its own e-mail address. If someone wants to print a document from an...schneier From Schneier on Security | June 18, 2010 at 06:37 PM
The Atlantic on stupid terrorists:
Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it's fair toPortrait...schneier From Schneier on Security | June 18, 2010 at 10:49 AM
A nice dose of risk reality:
Last week, the American Academy of Pediatrics issued a statement calling for large-type warning labels on the foods that kids most...schneier From Schneier on Security | June 17, 2010 at 07:28 PM
Doesn't the DHS have anything else to do?
As someone who believes that our nation has a right to enforce its borders, I should have been gratified when the Immigrations...schneier From Schneier on Security | June 17, 2010 at 11:57 AM
In at least three U.S. states, it is illegal to film an active duty policeman:
The legal justification for arresting the "shooter" rests on existing wiretapping...schneier From Schneier on Security | June 16, 2010 at 06:36 PM
Interesting:
The capability, called "electrical network frequency analysis" (ENF), is now attracting interest from the FBI and is considered the exciting new frontier...schneier From Schneier on Security | June 16, 2010 at 12:00 PM
The number of different ways to read my essays, commentaries, and links has grown recently. Here's the rundown:
You can read my writings daily on my blog.
These...schneier From Schneier on Security | June 15, 2010 at 06:05 PM