From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Truly bizarre story of someone who seems to have figured out how to successfully cheat at marathons. The evidence of his cheating is overwhelming, but no one knows...schneier From Schneier on Security | September 7, 2012 at 12:10 PM
I'm trying to separate cloud security hype from reality. To that end, I'd like to talk to a few big corporate CSOs or CISOs about their cloud security worries,...schneier From Schneier on Security | September 6, 2012 at 05:31 PM
In this story, we learn that hackers got their hands on a database of 12 million Apple Apple Unique Device Identifiers (UDIDs) by hacking an FBI laptop.
When I...schneier From Schneier on Security | September 6, 2012 at 11:48 AM
Liars and Outliers (along with two other books: Kip Hawley's memoir of his time at the TSA and Against Security, by Harvey Molotch) has been reviewed in the Wall...schneier From Schneier on Security | September 5, 2012 at 07:04 PM
In this fascinating piece of research, the question is asked: can we surreptitiously collect secret information from the brains of people using brain-computer interface...schneier From Schneier on Security | September 5, 2012 at 11:06 AM
Yet another biometric: eye twitch patterns:
...a person's saccades, their tiny, but rapid, involuntary eye movements, can be measured using a video camera. The...schneier From Schneier on Security | September 4, 2012 at 02:04 PM
A fable.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 31, 2012 at 09:22 PM
I'm on The WELL right now -- for the next week or so -- discussing my new book with anyone who wants to participate.
I'm also at Dragon*Con this weekend in Atlanta...schneier From Schneier on Security | August 31, 2012 at 02:20 PM
Shelly C. McArdle, Heather Rosoff, Richard S. John (2012), "The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal...schneier From Schneier on Security | August 30, 2012 at 02:22 PM
A reader sent me this photo of a shared lock. It's at the gate of a large ranch outside of Victoria, Texas. Multiple padlocks secure the device, but when a single...schneier From Schneier on Security | August 29, 2012 at 11:37 AM
In May, neuroscientist and popular author Sam Harris and I debated the issue of profiling Muslims at airport security. We each wrote essays, then went back and...schneier From Schneier on Security | August 28, 2012 at 03:38 PM
The squid Octopoteuthis deletron will drop portions of an arm to escape from a predator.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | August 24, 2012 at 09:32 PM
A surprisingly sensible list.
E. Why are you penalizing the 95% for the 5%? You don't do this in other areas of discipline at school. Even though you know some...schneier From Schneier on Security | August 24, 2012 at 06:18 PM
Nice post:
The screaming fear in your stomach before you give a speech to 12 kids in the fifth grade is precisely the same fear a presidential candidate feels...schneier From Schneier on Security | August 24, 2012 at 11:27 AM
Finally, someone takes a look at the $1 trillion number government officials are quoting as the cost of cybercrime. While it's a good figure to scare people, it...schneier From Schneier on Security | August 23, 2012 at 06:23 PM
Fascinating.
How long before someone claims he can use this technology to detect nervous people in airports?schneier From Schneier on Security | August 23, 2012 at 11:43 AM
Good list, summarized here:
1. Probability neglect – people sometimes don’t consider the probability of the occurrence of an outcome, but focus on the consequences...schneier From Schneier on Security | August 22, 2012 at 05:34 PM
Gallup has the results:
Despite recent negative press, a majority of Americans, 54%, think the U.S. Transportation Security Administration is doing either an excellent...schneier From Schneier on Security | August 22, 2012 at 11:09 AM
Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore:
Technologies the company has adopted protect...schneier From Schneier on Security | August 21, 2012 at 06:42 PM