From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...schneier From Schneier on Security | February 11, 2010 at 10:18 PM
Really interesting reading.
Scam-Detective: How did you find victims for your scams?
John: First you need to understand how the gangs work. At the bottom are...schneier From Schneier on Security | February 11, 2010 at 01:19 PM
The iTunes Store Terms and Conditions prohibits it:
Notice, as I read this clause not only are terrorists -- or at least those on terrorist watch lists -- prohibited...schneier From Schneier on Security | February 10, 2010 at 06:39 PM
This appears not to be a joke:
The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...schneier From Schneier on Security | February 9, 2010 at 06:09 PM
Isn't it a bit embarrassing for an "expert on counter-terrorism" to be quoted as saying this?
Bill Tupman, an expert on counter-terrorism from Exeter University...schneier From Schneier on Security | February 9, 2010 at 12:07 PM
Interesting research:
Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...schneier From Schneier on Security | February 8, 2010 at 07:54 PM
Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...schneier From Schneier on Security | February 8, 2010 at 12:03 PM
At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...schneier From Schneier on Security | February 7, 2010 at 02:06 PM
This is unconscionable:
At Tuesday's hearing, Senator Dianne Feinstein, Democrat of California and chairwoman of the Senate Intelligence Committee, asked Mr. Blair...schneier From Schneier on Security | February 5, 2010 at 05:59 PM
Does anyone think this is a good idea?
Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate...schneier From Schneier on Security | February 5, 2010 at 12:02 PM
Security is rarely static. Technology changes both security systems and attackers. But thereschneier From Schneier on Security | February 4, 2010 at 12:35 PM
Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only...schneier From Schneier on Security | February 3, 2010 at 10:07 AM
The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made...schneier From Schneier on Security | February 1, 2010 at 12:34 PM
Ross Anderson reports:
Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified...schneier From Schneier on Security | February 1, 2010 at 12:26 PM
How unique is your browser? Can you be tracked simply by its characteristics? The EFF is trying to find out. Their site Panopticlick will measure the characteristics...schneier From Schneier on Security | January 29, 2010 at 09:29 AM