From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 19, 2015 at 05:03 PM
Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general....Bruce Schneier From Schneier on Security | June 18, 2015 at 07:29 AM
When you connect hospital drug pumps to the Internet, they're hackable -- only surprising people who aren't paying attention. Rios says when he first told Hospira...Bruce Schneier From Schneier on Security | June 17, 2015 at 03:02 PM
New report: "The Tradeoff Fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation." New Annenberg survey results indicate...Bruce Schneier From Schneier on Security | June 17, 2015 at 07:44 AM
Peter Swire, law professor and one of the members of the President's review group on the NSA, writes about intelligence reform and the USA FREEDOM Act....Bruce Schneier From Schneier on Security | June 16, 2015 at 07:59 AM
Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. I still use Windows -- yes, I know, don't even start...Bruce Schneier From Schneier on Security | June 15, 2015 at 08:17 AM
On April 1, I announced the Eighth Movie-Plot Threat Contest: I want a movie-plot threat that shows the evils of encryption. (For those who don't know, a movie-plot...Bruce Schneier From Schneier on Security | June 13, 2015 at 01:11 PM
How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | June 12, 2015 at 05:41 PM
It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...Bruce Schneier From Schneier on Security | June 12, 2015 at 02:38 PM
The Washington Post has a good two part story on the history of insecurity of the Internet....Bruce Schneier From Schneier on Security | June 12, 2015 at 12:45 PM
Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...Bruce Schneier From Schneier on Security | June 12, 2015 at 07:18 AM
Earlier this week, I was at the eighth Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various aspects of the...Bruce Schneier From Schneier on Security | June 11, 2015 at 02:47 PM
News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport security "red team" tests was justifiably shocking...Bruce Schneier From Schneier on Security | June 11, 2015 at 07:10 AM
Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why...Bruce Schneier From Schneier on Security | June 10, 2015 at 04:27 PM
Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents...Bruce Schneier From Schneier on Security | June 10, 2015 at 12:27 PM
Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...Bruce Schneier From Schneier on Security | June 10, 2015 at 07:43 AM
This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...Bruce Schneier From Schneier on Security | June 9, 2015 at 09:15 AM
Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...Bruce Schneier From Schneier on Security | June 8, 2015 at 01:48 PM
Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...Bruce Schneier From Schneier on Security | June 8, 2015 at 07:09 AM
Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...Bruce Schneier From Schneier on Security | June 5, 2015 at 05:51 PM