From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Not an electronic wallet, a physical one:
Virtually indestructible, the dunhill Biometric Wallet will open only with touch of your fingerprint.
It can be linked...schneier From Schneier on Security | February 18, 2011 at 07:45 PM
NIST has just defined two new versions of SHA-512. They're SHA-512/224 and SHA-512/256: 224- and 256-bit truncations of SHA-512 with a new IV. They've done this...schneier From Schneier on Security | February 18, 2011 at 12:22 PM
Recently declassified: "Historical Study: The National Security Agency Scientific Advisory Board 1952schneier From Schneier on Security | February 17, 2011 at 02:38 PM
Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."
schneier From Schneier on Security | February 16, 2011 at 12:26 PM
Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.
He says the seven types...schneier From Schneier on Security | February 15, 2011 at 07:11 PM
Humans have a natural propensity to trust non-kin, even strangers. We do it so often, so naturally, that we don't even realize how remarkable it is. But except...schneier From Schneier on Security | February 15, 2011 at 11:43 AM
A newly discovered female squid pheromone sparks aggression in male squids. Article.
schneier From Schneier on Security | February 11, 2011 at 10:52 PM
From a blog post:
In my own area of study, the familiar trope of "balancing privacy and security" is a source of constant frustration to privacy advocates, because...schneier From Schneier on Security | February 11, 2011 at 06:48 PM
Design failure means you can pick winning tickets before scratching the coatings off. Most interesting is that there's statistical evidence that this sort of attack...schneier From Schneier on Security | February 10, 2011 at 12:42 PM
I was interviewed for this story on a mouse-powered explosives detector. Animal senses are better than any detection machine current technology can build, which...schneier From Schneier on Security | February 9, 2011 at 05:39 PM
I'd never heard the term "micromort" before. It's a probability: a one-in-a-million probability of death. For example, one-micromort activities are "travelling...schneier From Schneier on Security | February 8, 2011 at 11:46 AM
Scareware is fraudulent software that uses deceptive advertising to trick users into believing they're infected with some variety of malware, then convinces them...schneier From Schneier on Security | February 7, 2011 at 02:45 PM
Research from Japan: "Improvement of 'kurozukuri ika-shiokara' (fermented squid meat with ink) odor with Staphylococcus nepalensis isolated from the fish sauce...schneier From Schneier on Security | February 4, 2011 at 10:33 PM
A UK immigration officer decided to get rid of his wife by putting her on the no-fly list, ensuring that she could not return to the UK from abroad. This worked...schneier From Schneier on Security | February 4, 2011 at 07:35 PM
This makes sense.
Generally, militants prefer to attack soft targets where there are large groups of people, that are symbolic and recognizable around the world...schneier From Schneier on Security | February 4, 2011 at 12:00 PM
This is a clever development in ATM skimming technology. It's a skimmer that attaches to the ATM-room door lock, not the ATM itself. Combined with a hidden camera...schneier From Schneier on Security | February 3, 2011 at 11:54 AM
One website can learn if you're logged into other websites.
When you visit my website, I can automatically and silently determine if you're logged into Facebook...schneier From Schneier on Security | February 2, 2011 at 08:26 PM
This is the first piece of writing I've seen from Kip Hawley since he left the TSA in 2009. It's mostly generalities and platitudes.
schneier From Schneier on Security | February 2, 2011 at 12:42 PM