From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting article:
The reliability of witness testimony is a vastly complex subject, but legal scholars and forensic psychologists say it's possible to extract...schneier From Schneier on Security | June 4, 2012 at 11:36 AM
Flame seems to be another military-grade cyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers...schneier From Schneier on Security | June 4, 2012 at 11:21 AM
Interesting:
Cephalopods - squid, cuttlefish and octopuses - change colour by using tiny muscles in their skins to stretch out small sacs of black colouration....schneier From Schneier on Security | June 1, 2012 at 09:40 PM
Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...schneier From Schneier on Security | June 1, 2012 at 11:48 AM
I wrote about this sort of thing in 2006 in the UK, but it's even bigger business here:
The criminals, some of them former drug dealers, outwit the Internal Revenue...schneier From Schneier on Security | May 31, 2012 at 06:19 PM
A particularly clever form of retail theft -- especially when salesclerks are working fast and don't know the products -- is to switch bar codes. This particular...schneier From Schneier on Security | May 31, 2012 at 11:17 AM
When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much...schneier From Schneier on Security | May 30, 2012 at 05:54 PM
The context is tornado warnings:
The basic problem, Smith says, it that sirens are sounded too often in most places. Sometimes they sound in an entire county for...schneier From Schneier on Security | May 30, 2012 at 11:44 AM
We all knew this was possible, but researchers have found the exploit in the wild:
Claims were made by the intelligence agencies around the world, from MI5, NSA...schneier From Schneier on Security | May 29, 2012 at 12:28 PM
The legal kind. It's interesting:
Q: How realistic are movies that show people breaking into vaults?
A: Not very! In the movies it takes five minutes of razzle...schneier From Schneier on Security | May 29, 2012 at 11:03 AM
Remember my rebuttal of Sam Harris's essay advocating the profiling of Muslims at airports? That wasn't the end of it. Harris and I conducted a back-and-forth...schneier From Schneier on Security | May 28, 2012 at 11:58 AM
Seems that squid ink hasn't changed much in 160 million years. From this, researchers argue that the security mechanism of spraying ink into the water and escaping...schneier From Schneier on Security | May 25, 2012 at 09:01 PM
Interesting:
Although the plot was disrupted before a particular airline was targeted and tickets were purchased, al Qaeda's continued attempts to attack the U...schneier From Schneier on Security | May 25, 2012 at 11:43 AM
A new study concludes that more people are worried about cyber threats than terrorism.
...the three highest priorities for Americans when it comes to security...schneier From Schneier on Security | May 24, 2012 at 04:31 PM
Interesting essay on a trove on surveillance photos from Cold War-era Prague.
Cops, even secret cops, are for the most part ordinary people. Working stiffs concerned...schneier From Schneier on Security | May 24, 2012 at 11:17 AM
Interesting discussion of trust in this article on web hoaxes.
Kelly's students, like all good con artists, built their stories out of small, compelling details...schneier From Schneier on Security | May 23, 2012 at 05:32 PM
Interesting paper: "The Perils of Social Reading," by Neil M. Richards, from the Georgetown Law Journal.
Abstract: Our law currently treats records of our reading...schneier From Schneier on Security | May 23, 2012 at 12:25 PM
"Roots of Racism," by Elizabeth Culotta in Science:
Our attitudes toward outgroups are part of a threat-detection system that allows us to rapidly determine friend...schneier From Schneier on Security | May 22, 2012 at 06:10 PM
Details are in the article, but here's the general idea:
Let's follow the flow of the users:
Scammer buys user traffic from PornoXo.com and sends it to HQTubeVideos...schneier From Schneier on Security | May 22, 2012 at 11:24 AM