From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Cupcakes deemed security threat:
Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...schneier From Schneier on Security | December 25, 2011 at 04:28 PM
It's a metaphor that will not die.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 24, 2011 at 12:10 AM
In 1997, I wrote about something called a chosen-protocol attack, where an attacker can use one protocol to break another. Here's an example of the same thing...schneier From Schneier on Security | December 20, 2011 at 12:24 PM
This could be interesting:
NOtES exploits an obscure area of physics to accomplish its bright and sharp display, known as plasmonics. Light waves interact with...schneier From Schneier on Security | December 19, 2011 at 12:48 PM
It's squid season off the coast of Southern California.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't...schneier From Schneier on Security | December 16, 2011 at 10:24 PM
In 1997, I spoke at the Beyond HOPE Conference in New York. (HOPE stood for "Hackers Over Planet Earth.) A video of that talk is available online.schneier From Schneier on Security | December 16, 2011 at 08:52 PM
At the 1:46 mark, you'll see my first cameo appearance in a transvestite-themed rock video.schneier From Schneier on Security | December 16, 2011 at 07:28 PM
There's a report that Iran hacked the drones' GPS systems:
"The GPS navigation is the weakest point," the Iranian engineer told the Monitor, giving the most detailed...schneier From Schneier on Security | December 16, 2011 at 06:01 PM
When you give out money based on politics, without any accounting, this is what you get:
The West Michigan Shoreline Regional Development Commission (WMSRDC) is...schneier From Schneier on Security | December 16, 2011 at 05:21 PM
This is a really good analysis about the Buckshot Yankee attack against the classified military computer network in 2008. It contains a bunch of details I had...schneier From Schneier on Security | December 15, 2011 at 06:50 PM
My publisher is printing galley copies of Liars and Outliers. If anyone out there has a legitimate reason to get one, like writing book reviews for a newspaper...schneier From Schneier on Security | December 15, 2011 at 05:00 AM
Sparrows have fewer surviving offspring if they feel insecure, regardless of whether they actually are insecure. Liana Y. Zanette, Aija F. White, Marek C. Allen...schneier From Schneier on Security | December 14, 2011 at 07:22 PM
Al Qaeda is sewing bombs into people. Actually, not really. This is an "aspirational" terrorist threat, which basically means that someone mentioned it whilelot...schneier From Schneier on Security | December 14, 2011 at 12:17 PM
This article on airplane security says many of the same things I've been saying for years:
Given the breadth and complexity of threats to commercial aviation,Wired...schneier From Schneier on Security | December 13, 2011 at 06:46 PM
Iran has captured a U.S. surveillance drone. No one is sure how it happened. Looking at the pictures of the drone, it wasn't shot down and it didn't crash. The...schneier From Schneier on Security | December 13, 2011 at 12:30 PM
In London:
While photography bans are pretty common, the station has decided to only ban DSLRs due to "their combination of high quality sensor and high resolution"...schneier From Schneier on Security | December 12, 2011 at 06:08 PM