From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice:
In this paper we revisit the assumption that shellcode need be fundamentally different in structure than non-executable data. Specifically, we elucidate...schneier From Schneier on Security | March 25, 2010 at 12:16 PM
Such "logic":
If a person on the no-fly list dies, his name could stay on the list so that the government can catch anyone trying to assume his identity.
Butanyone's...schneier From Schneier on Security | March 24, 2010 at 11:38 AM
I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...schneier From Schneier on Security | March 23, 2010 at 07:42 PM
In British Columbia:
When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...schneier From Schneier on Security | March 23, 2010 at 05:23 PM
Amazing:
The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...schneier From Schneier on Security | March 23, 2010 at 11:13 AM
MS Word has been dethroned:
Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...schneier From Schneier on Security | March 22, 2010 at 06:03 PM
This, from a former CIA chief of station:
The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...schneier From Schneier on Security | March 22, 2010 at 02:10 PM
Plastination:
For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...schneier From Schneier on Security | March 19, 2010 at 09:47 PM
This would worry me, if the liquid ban weren't already useless.
The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...schneier From Schneier on Security | March 19, 2010 at 05:58 PM
Interesting research:
Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...schneier From Schneier on Security | March 19, 2010 at 11:58 AM
Who didn't see this coming?
More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...schneier From Schneier on Security | March 18, 2010 at 10:26 AM
Interesting research:
Analysing our data for security, though, shows that essentially all human-generated names provide poor resistance to guessing. For an attacker...schneier From Schneier on Security | March 16, 2010 at 11:44 AM
Here's a promotional security product designed by someone who knows nothing about security. The USB drive is "protected" by a combination lock. There are only...schneier From Schneier on Security | March 15, 2010 at 06:59 PM
"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman:
Abstract. We describe a method for identifying "typosquatting",...schneier From Schneier on Security | March 15, 2010 at 09:33 AM