From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...schneier From Schneier on Security | April 13, 2011 at 11:25 AM
You'd think the country would already have one of these:
Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...schneier From Schneier on Security | April 12, 2011 at 07:06 PM
Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...schneier From Schneier on Security | April 12, 2011 at 11:03 AM
I didn't know about this:
The law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers.
This...schneier From Schneier on Security | April 11, 2011 at 06:20 PM
The former CIA general counsel, John A. Rizzo, talks about his agency's assassination program, which has increased dramatically under the Obama administration:
...schneier From Schneier on Security | April 11, 2011 at 11:33 AM
Wendy Williams, Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid.
Kraken is the traditional name for gigantic sea monsters, and this book...schneier From Schneier on Security | April 8, 2011 at 09:08 PM
Colors are so last decade:
The U.S. government's new system to replace the five color-coded terror alerts will have two levels of warnings schneier From Schneier on Security | April 8, 2011 at 06:23 PM
This is impressive, and scary:
Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical...schneier From Schneier on Security | April 8, 2011 at 11:22 AM
Our brains are specially designed to deal with cheating in social exchanges. The evolutionary psychology explanation is that we evolved brain heuristics formodus...schneier From Schneier on Security | April 7, 2011 at 06:10 PM
It's been patented; no idea if it actually works.
...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...schneier From Schneier on Security | April 7, 2011 at 11:29 AM
"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart:
Abstract:The cumulative increase...schneier From Schneier on Security | April 6, 2011 at 11:03 AM
I have no idea why the Epsilon hack is getting so much press.
Yes, millions of names and e-mail addresses might have been stolen. Yes, other customer information...schneier From Schneier on Security | April 5, 2011 at 05:58 PM
Here's some very clever thinking from India's chief economic adviser. In order to reduce bribery, he proposes legalizing the giving of bribes:
Under the current...schneier From Schneier on Security | April 5, 2011 at 01:46 PM
Interesting post -- and discussion -- on Making Light about ebook fraud. Currently there are two types of fraud. The first is content farming, discussed in these...schneier From Schneier on Security | April 4, 2011 at 01:40 PM
It's hard to tell how serious this is.
Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...schneier From Schneier on Security | April 1, 2011 at 11:58 AM
This isn't good:
The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo...schneier From Schneier on Security | March 31, 2011 at 12:00 PM
In this amusing story of a terrorist plotter using pencil-and-paper cryptography instead of actually secure cryptography, there's this great paragraph:
Despite...schneier From Schneier on Security | March 30, 2011 at 12:14 PM
New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?":
There has been much academic discussion of federated authentication...schneier From Schneier on Security | March 29, 2011 at 11:43 AM