From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...Bruce Schneier From Schneier on Security | May 6, 2015 at 08:09 AM
Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...Bruce Schneier From Schneier on Security | May 5, 2015 at 07:59 AM
Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...Bruce Schneier From Schneier on Security | May 4, 2015 at 07:17 AM
It's an obvious biometric for cell phones: Bodyprint recognizes users by their ears with 99.8% precision with a false rejection rate of only 1 out of 13. Grip,...Bruce Schneier From Schneier on Security | May 1, 2015 at 01:46 PM
New research paper: "New methods for examining expertise in burglars in natural and simulated environments: preliminary findings": Expertise literature in mainstream...Bruce Schneier From Schneier on Security | April 30, 2015 at 03:22 PM
Google has a new Chrome extension called "Password Alert": To help keep your account safe, today we're launching Password Alert, a free, open-source Chrome extension...Bruce Schneier From Schneier on Security | April 30, 2015 at 10:14 AM
Interesting article. There are a lot of surveillance and privacy issues at play here....Bruce Schneier From Schneier on Security | April 29, 2015 at 07:12 AM
A drug dealer claims that the police leaned him over an 18th floor balcony and threatened to kill him if he didn't give up his password. One of the policemen involved...Bruce Schneier From Schneier on Security | April 28, 2015 at 01:50 PM
This is good: Just as "data" is being sold as "intelligence", a lot of security technologies are being sold as "security solutions" rather than what they for the...Bruce Schneier From Schneier on Security | April 28, 2015 at 07:21 AM
Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's...Bruce Schneier From Schneier on Security | April 27, 2015 at 07:27 AM
Interesting: While most female squid and octopuses have just one reproductive cycle before they die, vampire squid go through dozens of egg-making cycles in their...Bruce Schneier From Schneier on Security | April 24, 2015 at 05:43 PM
I think this is good: Obscurity means that personal information isn't readily available to just anyone. It doesn't mean that information is wiped out or even locked...Bruce Schneier From Schneier on Security | April 24, 2015 at 01:42 PM
From Data and Goliath: ...when I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose...Bruce Schneier From Schneier on Security | April 24, 2015 at 09:55 AM
Wow: The weak passwords -- which are hard-coded and can't be changed -- were only one item on a long list of critical defects uncovered by the review. The Wi-Fi...Bruce Schneier From Schneier on Security | April 23, 2015 at 08:19 AM
In Beyond Fear I wrote about trained officials recognizing "hinky" and how it differs from profiling: Ressam had to clear customs before boarding the ferry. He...Bruce Schneier From Schneier on Security | April 22, 2015 at 09:40 AM