From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I just wrote about the coming age of invisible surveillance. Here's another step along that process.
The material is black in color and cannot be seen through...schneier From Schneier on Security | July 19, 2012 at 11:46 AM
Normally, companies instruct their employees not to resist. But Hainan Airlines did the opposite:
Two safety officers and the chief purser got cash and property...schneier From Schneier on Security | July 18, 2012 at 02:27 PM
I don't know if this is real or fantasy:
Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body,remote...schneier From Schneier on Security | July 16, 2012 at 06:59 PM
In the UK, barbecued squid is in:
Sales of squid have tripled in recent months due to the growing popularity of Mediterranean food and the rise of the Dukan diet...schneier From Schneier on Security | July 13, 2012 at 09:53 PM
It turns out to be surprisingingly easy:
The owner, who posted the video at 1addicts.com, suspects the thieves broke the glass to access the BMW's on-board diagnostics...schneier From Schneier on Security | July 13, 2012 at 11:51 AM
This paper looks at access control for mobile phones. Basically, it's all or nothing: either you have a password that protects everything, or you have no password...schneier From Schneier on Security | July 12, 2012 at 05:59 PM
For years, it's been a clever trick to drop USB sticks in parking lots of unsuspecting businesses, and track how many people plug them into computers. I have long...schneier From Schneier on Security | July 12, 2012 at 02:47 PM
This is important:
In July 2011, a federal appeals court ruled that the Transportation Security Administration had to conduct a notice-and-comment rulemaking on...schneier From Schneier on Security | July 11, 2012 at 05:39 PM
William Gibson's Grippa Code is available for cryptanalysis. Break the code, win a prize.schneier From Schneier on Security | July 11, 2012 at 12:49 PM
From an article on the cocaine trade between Mexico and the U.S.:
"They erect this fence," he said, "only to go out there a few days later and discover that these...schneier From Schneier on Security | July 10, 2012 at 09:33 AM
Two, at least:
"Bee stings killed as many in UK as terrorists, says watchdog."
"Americans Are as Likely to Be Killed by Their Own Furniture as by Terrorism."
Is...schneier From Schneier on Security | July 9, 2012 at 05:36 PM
A team at the University of Texas successfully spoofed the GPS and took control of a DHS drone, for about $1,000 in off-the-shelf parts. Does anyone think that...schneier From Schneier on Security | July 9, 2012 at 11:02 AM
This was suprisingly interesting.
When a body is mysterious, you cut it open. You peel back the skin and take stock of its guts. It is the science of an arrow,...schneier From Schneier on Security | July 6, 2012 at 09:58 PM
Children are being warned that the name of their first pet should contain at least eight characters and a digit.schneier From Schneier on Security | July 6, 2012 at 02:40 PM
I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...schneier From Schneier on Security | July 5, 2012 at 11:17 AM
It's designed to steal blueprints and send them to China.
Note that although this is circumstantial evidence that the virus is from China, it is possible that...schneier From Schneier on Security | July 3, 2012 at 11:22 AM
Last week I was at the Workshop on Economics and Information Security in Berlin. Excellent conference, as always. Ross Anderson liveblogged the event; see the...schneier From Schneier on Security | July 2, 2012 at 11:20 AM
A dead 13-foot-long giant squid has been found off the coast of New South Wales.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | June 29, 2012 at 09:14 PM