From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
ID checks were a common response to the terrorist attacks of 9/11, but they'll soon be obsolete. You won't have to show your ID, because you'll be identified automatically...Bruce Schneier From Schneier on Security | October 5, 2015 at 07:11 AM
The Hawaiian Bobtail Squid deposits bacteria on its eggs to keep them safe. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | October 2, 2015 at 05:11 PM
Former Raytheon chief scientist Bill Swanson has joined our board of directors. For those who don't know, Resilient Systems is my company. I'm the CTO, and we sell...Bruce Schneier From Schneier on Security | October 2, 2015 at 03:06 PM
The news from the Office of Personnel Management hack keeps getting worse. In addition to the personal records of over 20 million US government employees, we've...Bruce Schneier From Schneier on Security | October 2, 2015 at 07:35 AM
AI theorist Eliezer Yudkowsky: "Every eighteen months, the minimum IQ necessary to destroy the world drops by one point." Oh, how I wish I said that....Bruce Schneier From Schneier on Security | October 1, 2015 at 01:03 PM
During the Cold War, the KGB was very adept at identifying undercover CIA officers in foreign countries through what was basically big data analysis. (Yes, this...Bruce Schneier From Schneier on Security | October 1, 2015 at 08:00 AM
The website Unfitbits.com has a series of instructional videos on how to spoof fitness trackers, using such things as a metronome, pendulum, or power drill. With...Bruce Schneier From Schneier on Security | September 30, 2015 at 01:02 PM
For the past six years, Volkswagen has been cheating on the emissions testing for its diesel cars. The cars' computers were able to detect when they were being...Bruce Schneier From Schneier on Security | September 30, 2015 at 10:56 AM
The Intercept has a new story from the Snowden documents about The UK's GCHQ's surveillance of the Internet: The mass surveillance operation code-named KARMA...Bruce Schneier From Schneier on Security | September 29, 2015 at 07:16 AM
Fortune has a three-part article on the Sony attack by North Korea. There's not a lot of tech here; it's mostly about Sony's internal politics regarding the movie...Bruce Schneier From Schneier on Security | September 28, 2015 at 07:22 AM
It looks like a Nintendo game. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 25, 2015 at 05:30 PM
You can wrap your house in tinfoil, but when you start shining bright lights to defend yourself against alien attack, you've gone too far. In general, society puts...Bruce Schneier From Schneier on Security | September 25, 2015 at 03:23 PM
No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates...Bruce Schneier From Schneier on Security | September 25, 2015 at 06:54 AM
In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the "combat mind-set." Here is his summary: In White...Bruce Schneier From Schneier on Security | September 24, 2015 at 12:39 PM
Fascinating story about a man who figured out how to hack the game show "Press Your Luck" in 1984....Bruce Schneier From Schneier on Security | September 23, 2015 at 07:05 AM
The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....Bruce Schneier From Schneier on Security | September 22, 2015 at 02:34 PM
Gizmodo reports that UK airport security confiscates frozen liquids: "He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid....Bruce Schneier From Schneier on Security | September 22, 2015 at 02:22 PM
FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case...Bruce Schneier From Schneier on Security | September 21, 2015 at 12:45 PM
Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took...Bruce Schneier From Schneier on Security | September 21, 2015 at 07:34 AM
It looks impressive, maybe 20-30 feet long: "I think this might be the coolest thing I have ever built," said Barry Crawford about his giant, metal squid that was...Bruce Schneier From Schneier on Security | September 19, 2015 at 01:33 PM