From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Clever:
Chris Cardinal discovered someone running such a scam on Amazon using his account: the scammer contacted Amazon pretending to be Chris, supplying his billing...schneier From Schneier on Security | December 21, 2012 at 12:20 PM
The "Great Firewall of China" is now able to detect and block encryption:
A number of companies providing "virtual private network" (VPN) services to users in...schneier From Schneier on Security | December 20, 2012 at 12:32 PM
This is an interesting blog post:
Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one canHere's...schneier From Schneier on Security | December 19, 2012 at 12:47 PM
There's a new exploit against Samsung Galaxy phones that allows a rogue app access to all memory. A hacker could copy all of your data, erase all of your data,...schneier From Schneier on Security | December 18, 2012 at 12:38 PM
A Canadian claims that the message is based on a WWI codebook. A spokesman from GCHQ remains dubious, but says they'll be happy to look at the proposed solution...schneier From Schneier on Security | December 17, 2012 at 06:39 PM
Neat art project. Another link.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 14, 2012 at 10:44 PM
Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, by Harvey Molotch, Princeton University Press, 278 pages, $35
Security...schneier From Schneier on Security | December 14, 2012 at 06:24 PM
There's a rise in QR codes that point to fraudulent sites. One of the warning signs seems to be a sticker with the code, rather than a code embedded in an advertising...schneier From Schneier on Security | December 13, 2012 at 12:19 PM
Interesting development in forensic analysis:
Comparing the unique pattern of the frequencies on an audio recording with a database that has been logging these...schneier From Schneier on Security | December 12, 2012 at 06:59 PM
This book is available as a free pdf download:
The National Cyber Security Framework Manual provides detailed background information and in-depth theoretical frameworks...schneier From Schneier on Security | December 11, 2012 at 07:03 PM
Excellent article: "How to Shut Down Internets."
First, he describes what just happened in Syria. Then:
Egypt turned off the internet by using the Border Gateway...schneier From Schneier on Security | December 11, 2012 at 12:08 PM
Yet another way two-factor authentication has been bypassed:
For a user to fall prey to Eurograbber, he or she must first be using a computer infected with the...schneier From Schneier on Security | December 10, 2012 at 07:04 PM
Four squids on the cover of this week's Economist represent the four massive (and intrusive) data-driven Internet giants: Google, Facebook, Apple, and Amazon.
Interestingly...schneier From Schneier on Security | December 7, 2012 at 10:04 PM
Not the sort of pairing I normally think of, but:
Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh...schneier From Schneier on Security | December 6, 2012 at 04:59 PM
Another historical cipher, this one from the 1600s, has been cracked:
Senior math major Lucas Mason-Brown, who has done the majority of the decoding, said his...schneier From Schneier on Security | December 5, 2012 at 12:01 PM
It’s a feudal world out there.
Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android...schneier From Schneier on Security | December 3, 2012 at 01:24 PM