From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Verified Voting Foundation has released a comprehensive state-by-state report on electronic voting machines (report, executive summary, and news coverage)....schneier From Schneier on Security | August 6, 2012 at 11:43 AM
It seems that quantum computers might use superconducting quantum interference devices (SQUIDs).
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | August 3, 2012 at 09:08 PM
In a long article about insecurities in gun safes, there's this great paragraph:
Unfortunately, manufacturers and consumers are deceived and misled into a false...schneier From Schneier on Security | August 3, 2012 at 05:57 PM
Horrific events, such as the massacre in Aurora, can be catalysts for social and political change. Sometimes it seems that they're the only catalyst; recall how...schneier From Schneier on Security | August 3, 2012 at 11:03 AM
Year ago, EPIC sued the TSA over full body scanners (I was one of the plantiffs), demanding that they follow their own rules and ask for public comment. The court...schneier From Schneier on Security | August 2, 2012 at 07:19 PM
The attack only works sometimes, but it does allow access to millions of hotel rooms worldwide that are secured by Onity brand locks. Basically, you can read the...schneier From Schneier on Security | August 2, 2012 at 06:08 PM
Wired has an interesting and comprehensive profile on Eugene Kaspersky. Especially note Kaspersky Lab's work to uncover US cyberespionage against Iran, Kaspersky's...schneier From Schneier on Security | August 2, 2012 at 11:23 AM
The new thing about the Aurora shooting wasn't the weaponry, but the armor:
What distinguished Holmes wasn't his offense. It was his defense. At Columbine, Harris...schneier From Schneier on Security | August 1, 2012 at 06:34 PM
We already know you can wear fake irises to fool a scanner into thinking you're not you, but this is the first fake iris you can use for impersonation: to fool...schneier From Schneier on Security | July 31, 2012 at 04:11 PM
This is impressive:
The device has Bluetooth and Wi-Fi adapters, a cellular connection, dual Ethernet ports, and hacking and remote access tools that let security...schneier From Schneier on Security | July 31, 2012 at 11:30 AM
This TED talk trots out the usual fear-mongering that technology leads to terrorism. The facts are basically correct, but there are no counterbalancing facts,...schneier From Schneier on Security | July 30, 2012 at 05:40 PM
There have been a few hoax bomb threats in Detroit recently (Windsor tunnel, US-Canada bridge, Tiger Stadium). The good news is that police learned; during the...schneier From Schneier on Security | July 30, 2012 at 12:34 PM
Now this is neat.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | July 27, 2012 at 09:26 PM
Cybercriminals are using commercial spamflooding services to distract their victims during key moments of a cyberattack.
Clever, but in retrospect kind of obvious...schneier From Schneier on Security | July 27, 2012 at 02:42 PM
Police in Hastings, in the UK, outfitted mobile phones with tracking devices and left them in bars and restaurants, hoping to catch mobile phone thieves in thestole...schneier From Schneier on Security | July 26, 2012 at 12:02 PM
Handcuffs pose a particular key management problem. Officers need to be able to unlock handcuffs locked by another officer, so they're all designed to be opened...schneier From Schneier on Security | July 25, 2012 at 11:42 AM
This is a really interesting research paper (article here) on implicit passwords: something your unconscious mind remembers but your conscious mind doesn't know...schneier From Schneier on Security | July 24, 2012 at 11:28 AM
An antidote to the American cycle of threat, fear, and overspending in response to terrorism is this, about Norway on the first anniversary of its terrorist massacre...schneier From Schneier on Security | July 23, 2012 at 11:15 AM