From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker:
The discrepancy between the panic generated by terrorism and the deaths...schneier From Schneier on Security | August 18, 2011 at 06:32 PM
"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger.
Abstract. Since Rijndael was chosen as the Advanced...schneier From Schneier on Security | August 18, 2011 at 11:12 AM
A prison in Brazil uses geese as part of its alarm system.
There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...schneier From Schneier on Security | August 17, 2011 at 06:51 PM
Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.schneier From Schneier on Security | August 17, 2011 at 11:13 AM
Really interesting research.
Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high...schneier From Schneier on Security | August 16, 2011 at 03:47 PM
A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie:
Researchers at U.C. Berkeley have discovered that some of the net’s mostfinally...schneier From Schneier on Security | August 15, 2011 at 10:43 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | August 12, 2011 at 09:28 PM
My new book, Liars and Outliers, has a cover.
Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...schneier From Schneier on Security | August 12, 2011 at 07:09 PM
The African crested rat applies tree poison to its fur to make itself more deadly.
The researchers made their discovery after presenting a wild-caught crestedAcokanthera...schneier From Schneier on Security | August 12, 2011 at 04:13 PM
This seems like a really bad idea:
...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...schneier From Schneier on Security | August 12, 2011 at 02:46 PM
Just announced:
Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...schneier From Schneier on Security | August 10, 2011 at 09:11 PM
I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one:
The taxonomy of operational cyber security risks, summarized in Table...schneier From Schneier on Security | August 10, 2011 at 11:39 AM
There's a security story from biology I've used a few times: plants that use chemicals to call in airstrikes by wasps on the herbivores attacking them. This is...schneier From Schneier on Security | August 9, 2011 at 06:09 PM
An article from Salon -- lots of interesting research.
My previous blog post on the topic.schneier From Schneier on Security | August 9, 2011 at 10:45 AM
I've been using the phrase "arms race" to describe the world's militaries' rush into cyberspace for a couple of years now. Here's a good article on the topic that...schneier From Schneier on Security | August 8, 2011 at 11:13 AM
I just can't make this stuff up:
A report of a severed hand found at an Oahu seabird sanctuary has turned out to be dried squid.
Remember: if you see something...schneier From Schneier on Security | August 5, 2011 at 09:24 PM