From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Google's contest at the CanSecWest conference:
Today we’re announcing our third Pwnium competitionPwnium 3. Google Chrome is already featured in the Pwn2Own competition...schneier From Schneier on Security | February 7, 2013 at 12:35 PM
This was big news last week, and I spent a lot of time doing press interviews about it. But while it is an important story -- hacking a newspaper, looking forGhostNet...schneier From Schneier on Security | February 6, 2013 at 12:36 PM
I just printed this out: "Proactive Defense for Evolving Cyber Threats," a Sandia Report by Richard Colbaugh and Kristin Glass. It's a collection of academic...schneier From Schneier on Security | February 5, 2013 at 01:38 PM
I don't see a lot written about security seals, despite how common they are. This article is a very basic overview of the technologies.schneier From Schneier on Security | February 4, 2013 at 07:43 PM
Interesting:
"It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...schneier From Schneier on Security | February 4, 2013 at 12:39 PM
Webpage says that it's "the most effective lightweight, portable anchor around."
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | February 1, 2013 at 10:40 PM
The Washington Post has the story:
The move, requested by the head of the Defense Department's Cyber Command, is part of an effort to turn an organization that...schneier From Schneier on Security | February 1, 2013 at 06:36 PM
Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...schneier From Schneier on Security | February 1, 2013 at 12:08 PM
Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard:
The ...schneier From Schneier on Security | January 31, 2013 at 07:28 PM
All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...schneier From Schneier on Security | January 31, 2013 at 01:09 PM
Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...schneier From Schneier on Security | January 30, 2013 at 06:20 PM
Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...schneier From Schneier on Security | January 30, 2013 at 12:51 PM
I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this:
Results showed...schneier From Schneier on Security | January 29, 2013 at 12:32 PM
This story exemplifies everything that's wrong with our see-something-say-something war on terror: a perfectly innocent person on an airplane, a random person identifying...schneier From Schneier on Security | January 28, 2013 at 07:25 PM
This is fascinating:
Intuitively we understand that people surrounded by violence are more likely to be violent themselves. This isn't just some nebulous phenomenon...schneier From Schneier on Security | January 28, 2013 at 12:07 PM
Just the thing. (Note that this is different than the previous squid USB drive I blogged about.)
As usual, you can also use this squid post to talk about the...schneier From Schneier on Security | January 25, 2013 at 10:15 PM
This interview was conducted last month, at an artificial intelligence conference at Oxford. schneier From Schneier on Security | January 25, 2013 at 08:47 PM