From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.schneier From Schneier on Security | January 12, 2012 at 08:39 PM
Very interesting:
The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...schneier From Schneier on Security | January 12, 2012 at 06:37 PM
Apple has a patent on splitting a key between a portable device and its power supply.
Clever idea.schneier From Schneier on Security | January 12, 2012 at 11:53 AM
John Mueller has been collecting them:
Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...schneier From Schneier on Security | January 10, 2012 at 12:56 PM
Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...schneier From Schneier on Security | January 9, 2012 at 06:55 PM
Have you wondered what $1.2 billion in airport security gets you? The TSA has compiled its own "Top 10 Good Catches of 2011":
10) Snakes, turtles, and birds were...schneier From Schneier on Security | January 9, 2012 at 12:00 PM
It's a serious vulnerability. Note that this is the research that was mistakenly reported as allowing hackers to set your printer on fire.
Here's a list of all...schneier From Schneier on Security | January 6, 2012 at 07:50 PM
The author of this article notices that it's often easy to guess a cell phone PIN because of smudge marks on the screen. Those smudge marks indicate the four PIN...schneier From Schneier on Security | January 6, 2012 at 12:30 PM
The Liars and Outliers webpage is live. On it you can find links to order both paper and e-book copies from a variety of online retailers, and signed copies directly...schneier From Schneier on Security | January 5, 2012 at 07:39 PM
The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...schneier From Schneier on Security | January 4, 2012 at 02:37 PM
Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56schneier From Schneier on Security | January 2, 2012 at 06:33 PM
Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...schneier From Schneier on Security | January 2, 2012 at 12:15 PM
Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...schneier From Schneier on Security | December 30, 2011 at 12:11 PM
There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...schneier From Schneier on Security | December 29, 2011 at 07:58 PM
A great story:
Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...schneier From Schneier on Security | December 29, 2011 at 03:47 PM
Here's a new biometric: how you sit:
...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...schneier From Schneier on Security | December 28, 2011 at 05:40 PM
Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.schneier From Schneier on Security | December 27, 2011 at 12:22 PM