From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...schneier From Schneier on Security | November 13, 2012 at 12:15 PM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...schneier From Schneier on Security | November 12, 2012 at 11:47 AM
Burger King introduces a black burger with ketchup that includes squid ink. Only in Japan, of course.schneier From Schneier on Security | November 9, 2012 at 10:16 PM
From the Department of Homeland Security, a handy list of 19 suspicious behaviors that could indicate that a hotel guest is actually a terrorist.
I myself have...schneier From Schneier on Security | November 9, 2012 at 07:32 PM
Interesting research from RAND:
Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...schneier From Schneier on Security | November 9, 2012 at 12:41 PM
Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted.
Creating a cyber-rock is cheap. Buying...schneier From Schneier on Security | November 8, 2012 at 07:24 PM
Here's a great concept: a micromort:
Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...schneier From Schneier on Security | November 8, 2012 at 12:57 PM
It's hard for me to get too worked up about this vulnerability:
Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...schneier From Schneier on Security | November 7, 2012 at 07:39 PM
This is the sort of thing I wrote about in my latest book.
The Prisoners Dilemma as outlined above can be seen in action in two variants within regulatory activities...schneier From Schneier on Security | November 7, 2012 at 02:16 PM
Expensive, but it's in complete working order. They're also auctioning off a complete set of rotors; those are even rarer than the machines -- which are often missing...schneier From Schneier on Security | November 6, 2012 at 06:17 PM
Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...schneier From Schneier on Security | November 6, 2012 at 04:13 PM
It doesn't look good.
These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...schneier From Schneier on Security | November 6, 2012 at 12:40 PM
I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.schneier From Schneier on Security | November 5, 2012 at 08:54 PM
I'd sure like to know more about this:
Government code-breakers are working on deciphering a message that has remained a secret for 70 years.
It was found onSome...schneier From Schneier on Security | November 5, 2012 at 07:26 PM
I've written about it before, but not half as well as this story:
"That search was absolutely useless." I said. "And just shows how much of all of this is security...schneier From Schneier on Security | November 5, 2012 at 12:19 PM
Interesting This American Life show on loopholes. The first part is about getting around the Church's ban against suicide. The second part is about an interesting...schneier From Schneier on Security | November 2, 2012 at 11:37 AM
Really nice profile in the New York Times. It includes a discussion of the Clean Slate program:
Run by Dr. Howard Shrobe, an M.I.T. computer scientist who is...schneier From Schneier on Security | November 1, 2012 at 11:34 AM