From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This article talks about legitimate companies buying zero-day exploits, including the fact that "an undisclosed U.S. government contractor recently paid $250,000...schneier From Schneier on Security | April 2, 2012 at 12:56 PM
Interesting research:
The squid use two closely spaced organs called statocysts to sense sound.
"I think of a statocyst as an inside-out tennis ball," explains...schneier From Schneier on Security | March 30, 2012 at 09:28 PM
Normally I just delete these as spam, but this summer program for graduate students 1) looks interesting, and 2) has some scholarship money available. schneier From Schneier on Security | March 29, 2012 at 07:07 PM
As I posted previously, I have been debating former TSA Administrator Kip Hawley on the Economist website. I didn't bother reposting my opening statement and rebuttal...schneier From Schneier on Security | March 29, 2012 at 11:53 AM
Last weekend was the 2012 SHARCS (Special-Purpose Hardware for Attacking Cryptographic Systems) conference. The presentations are online.schneier From Schneier on Security | March 28, 2012 at 11:05 AM
"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti:
Abstract: In recent years, a large number of data breaches...schneier From Schneier on Security | March 27, 2012 at 12:24 PM
I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...schneier From Schneier on Security | March 26, 2012 at 06:02 PM
This is a neat story:
A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...schneier From Schneier on Security | March 26, 2012 at 11:38 AM
On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted...schneier From Schneier on Security | March 23, 2012 at 11:33 AM
In an excellent article in Wired, James Bamford talks about the NSA's codebreaking capability.
According to another top official also involved with the program...schneier From Schneier on Security | March 22, 2012 at 12:17 PM
A way to securely erase paper:
"The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time isNew...schneier From Schneier on Security | March 21, 2012 at 11:26 AM
A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph:
At a closed-door briefing, the senators were shown howtake...schneier From Schneier on Security | March 20, 2012 at 01:52 PM
Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.schneier From Schneier on Security | March 19, 2012 at 07:33 PM
I like the quote at the end of this excerpt:
Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they...schneier From Schneier on Security | March 19, 2012 at 11:38 AM
It looks great.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 16, 2012 at 09:57 PM
Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins).schneier From Schneier on Security | March 16, 2012 at 03:35 PM
The U.S. military has a non-lethal heat ray. No details on what "non-lethal" means in this context.schneier From Schneier on Security | March 16, 2012 at 12:09 PM
I have several stories in the news (and one podcast), mostly surrounding the talks I gave at the RSA Conference last month.schneier From Schneier on Security | March 15, 2012 at 07:35 PM