From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's actually pretty good.
Also note that the site is redesigning its privacy. As we learned from Microsoft, nothing motivates a company to improve its security...schneier From Schneier on Security | August 30, 2011 at 05:24 PM
We finally have some, even though the company isn't talking:
So just how well crafted was the e-mail that got RSA hacked? Not very, judging by what F-Secure found...schneier From Schneier on Security | August 30, 2011 at 03:52 PM
It's hard to know how serious this really is:
The screenshots appear as B-roll footage in the documentary for six secondsschneier From Schneier on Security | August 29, 2011 at 11:20 AM
The industry is in decline:
A generation ago, most of the island's 10,000 residents worked in the squid industry, either as sellers like Kim or as farmer-fishermen...schneier From Schneier on Security | August 26, 2011 at 08:40 PM
This is a picture of a pair of wire cutters secured to a table with a wire.
Someone isn't thinking this through....schneier From Schneier on Security | August 26, 2011 at 08:07 PM
Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors:
The problem with threat inflation and misapplied history is that there...schneier From Schneier on Security | August 26, 2011 at 04:09 PM
John Mueller and his students analyze the 33 cases of attempted terrorism in the U.S. since 9/11. So few of them are actually real, and so many of them were created...schneier From Schneier on Security | August 26, 2011 at 11:26 AM
Nick Helm won an award for the funniest joke at the Edinburgh Fringe Festival:
Nick Helm: "I needed a password with eight characters so I picked Snow White and...schneier From Schneier on Security | August 25, 2011 at 09:08 PM
The security problems associated with moving $12B in gold from London to Venezuela.
It seems to me that Chschneier From Schneier on Security | August 25, 2011 at 05:43 PM
It's easy:
Researchers from UCSD pointed thermal cameras towards plastic ATM PIN pads and metal ATM PIN pads to test how effective they were at stealing PIN numbers...schneier From Schneier on Security | August 24, 2011 at 12:13 PM
Clever:
"When the user types on the soft keyboard on her smartphone (especially when she holds her phone by hand rather than placing it on a fixed surface), the...schneier From Schneier on Security | August 23, 2011 at 07:09 PM
Worried about someone hacking your implanted medical devices? Here's a signal-jamming device you can wear.schneier From Schneier on Security | August 23, 2011 at 11:56 AM
Sleeve cameras aren't new, but they're now smaller than ever and the cheaters are getting more sophisticated:
In January, at the newly opened $4-billion Cosmopolitan...schneier From Schneier on Security | August 23, 2011 at 10:44 AM
Long essay on the value of pseudonymity. From the conclusions:
Here lies the huge irony in this discussion. Persistent pseudonyms aren't ways to hide who yoube...schneier From Schneier on Security | August 22, 2011 at 11:01 AM
Nice essay on the danger of too much security:
The great lie of the war on terror is not that we can sacrifice a little liberty for greater security. It is that...schneier From Schneier on Security | August 19, 2011 at 06:57 PM
Any institution delegated with the task of preventing terrorism has a dilemma: they can either do their best to prevent terrorism, or they can do their best toA...schneier From Schneier on Security | August 19, 2011 at 01:55 PM