From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Imagine this: A terrorist hacks into a commercial airplane from the ground, takes over the controls from the pilots and flies the plane into the ground. It sounds...Bruce Schneier From Schneier on Security | April 21, 2015 at 02:40 PM
This is troubling: Chris Roberts was detained by FBI agents on Wednesday as he was deplaning his United flight, which had just flown from Denver to Syracuse, New...Bruce Schneier From Schneier on Security | April 21, 2015 at 11:40 AM
It's getting hard to keep track of the US intelligence community leakers without a scorecard. So here's my attempt: Leaker #1: Chelsea Manning. Leaker #2: Edward...Bruce Schneier From Schneier on Security | April 20, 2015 at 12:36 PM
New operational information on the US's drone program, published by the Intercept and Der Speigel....Bruce Schneier From Schneier on Security | April 20, 2015 at 08:16 AM
This is neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 17, 2015 at 05:31 PM
The Congressional Research Service has released a report on the no-fly list and current litigation that it violates due process....Bruce Schneier From Schneier on Security | April 17, 2015 at 07:54 AM
Fans attending Major League Baseball games are being greeted in a new way this year: with metal detectors at the ballparks. Touted as a counterterrorism measure...Bruce Schneier From Schneier on Security | April 15, 2015 at 07:58 AM
Paul Krugman argues that we'll give up our privacy because we want to emulate the rich, who are surrounded by servants who know everything about them: Consider...Bruce Schneier From Schneier on Security | April 14, 2015 at 07:32 AM
Citizen Lab has issued a report on China's "Great Cannon" attack tool, used in the recent DDoS attack against GitHub. We show that, while the attack infrastructure...Bruce Schneier From Schneier on Security | April 13, 2015 at 10:15 AM
John Mueller suggests an alternative to the FBI's practice of encouraging terrorists and then arresting them for something they would have never have planned on...Bruce Schneier From Schneier on Security | April 10, 2015 at 11:38 AM
Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....Bruce Schneier From Schneier on Security | April 9, 2015 at 07:45 AM
The Southern Poverty Law Center warns of the rise of lone-wolf terrorism. From a security perspective, lone wolves are much harder to prevent because there is no...Bruce Schneier From Schneier on Security | April 8, 2015 at 11:21 AM
Here's an article on making secret phone calls with cell phones. His step-by-step instructions for making a clandestine phone call are as follows: Analyze your...Bruce Schneier From Schneier on Security | April 7, 2015 at 10:32 AM
Giant squid caught on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:17 PM
Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:16 PM
The security audit of the TrueCrypt code has been completed (see here for the first phase of the audit), and the results are good. Some issues were found, but nothing...Bruce Schneier From Schneier on Security | April 3, 2015 at 02:14 PM