From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Neat:
The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team...schneier From Schneier on Security | June 3, 2011 at 06:49 PM
At first glance, this seems like a particularly dumb opening line of an article:
Open-source software may not sound compatible with the idea of strong cybersecurity...schneier From Schneier on Security | June 2, 2011 at 05:11 PM
Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...schneier From Schneier on Security | June 2, 2011 at 02:48 PM
In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...schneier From Schneier on Security | June 2, 2011 at 12:32 PM
CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....schneier From Schneier on Security | June 1, 2011 at 01:59 PM
That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...schneier From Schneier on Security | May 31, 2011 at 06:12 PM
In my latest book (available February), I talk about various mechanisms for societal security: how we as a group protect ourselves from the "dishonest minority"...schneier From Schneier on Security | May 31, 2011 at 11:34 AM
Cyber criminals are getting aggressive with their social engineering tactics.
Val Christopherson said she received a telephone call last Tuesday from a man stating...schneier From Schneier on Security | May 30, 2011 at 11:58 AM
All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...schneier From Schneier on Security | May 27, 2011 at 11:04 AM
It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...schneier From Schneier on Security | May 26, 2011 at 06:57 PM
It's now available as a free download:
A free version of the Blackhole exploit kit has appeared online in a development that radically reduces the entry-level...schneier From Schneier on Security | May 25, 2011 at 03:28 PM
SCADA systems -- computer systems that control industrial processes -- are one of the ways a computer hack can directly affect the real world. Here, the fearssuccessfully...schneier From Schneier on Security | May 24, 2011 at 10:50 AM
I haven't written about Dropbox's security problems; too busy with the book. But here's an excellent summary article from The Economist.
The meta-issue is pretty...schneier From Schneier on Security | May 23, 2011 at 11:47 AM
The Centers for Disease Control and Prevention weigh in on preparations for the zombie apocalypse.
schneier From Schneier on Security | May 20, 2011 at 09:00 PM
TSA-style security is now so normal that it's part of a Disney ride:
The second room of the queue is now a security check area, similar to a TSA checkpoint. The...schneier From Schneier on Security | May 20, 2011 at 07:43 PM