From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Pretty photo of firefly squid beached along a coast. I've written about firefly squid before.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | September 21, 2012 at 09:30 PM
I usually don't post reviews of Liars and Outliers -- they're all here -- but I am particularly proud of this one.schneier From Schneier on Security | September 21, 2012 at 08:29 PM
Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...schneier From Schneier on Security | September 20, 2012 at 11:02 AM
An analysis of 3.4 million four-digit PINs. ("1234" is the most common: 10.7% of all PINs. The top 20 PINs are 26.8% of the total. "8068" is the least common...schneier From Schneier on Security | September 19, 2012 at 05:31 PM
A recent Ars Technica article made the point that password crackers are getting better, and therefore passwords are getting weaker. It's not just computing speed...schneier From Schneier on Security | September 19, 2012 at 09:41 AM
A space-traveling squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 18, 2012 at 09:37 PM
It's a known theft tactic to swallow what you're stealing. It works for food at the supermarket, and it also can work for diamonds. Here's a twist on that tactic...schneier From Schneier on Security | September 17, 2012 at 02:10 PM
In Valdés, Spain.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 14, 2012 at 09:15 PM
Two of my books can be seen in the background in CBS' new Sherlock Holmes drama, Elementary. A copy of Schneier on Security is prominently displayed on Sherlock...schneier From Schneier on Security | September 14, 2012 at 07:20 PM
This sort of attack will become more common as banks require two-factor authentication:
Tatanga checks the user account details including the number of accounts...schneier From Schneier on Security | September 14, 2012 at 04:23 PM
This statistical research says once per decade:
Abstract: Quantities with right-skewed distributions are ubiquitous in complex social systems, including political...schneier From Schneier on Security | September 13, 2012 at 06:20 PM
Nice essay on the futility of trying to prevent another 9/11:
"Never again." It is as simplistic as it is absurd. It is as vague as it is damaging. No two words...schneier From Schneier on Security | September 12, 2012 at 05:55 PM
The "Australia's Security Nightmares: The National Security Short Story Competition" is part of Safeguarding Australia 2012.
To aid the national security community...schneier From Schneier on Security | September 12, 2012 at 11:23 AM
Well, new to us:
You see, an EMV payment card authenticates itself with a MAC of transaction data, for which the freshly generated component is the unpredictable...schneier From Schneier on Security | September 11, 2012 at 02:35 PM
There's a lot:
Advance tickets are required to enter this public, outdoor memorial. To book them, you’re obliged to provide your home address, email address, and...schneier From Schneier on Security | September 11, 2012 at 11:45 AM
Larry Constantine disputes David Stanger's book about Stuxnet:
So, what did he get wrong? First of all, the Stuxnet worm did not escape into the wild. The analysis...schneier From Schneier on Security | September 10, 2012 at 11:51 AM
Wacky. Other stories about the story.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 7, 2012 at 09:41 PM