From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It has been accused of it.
I doubt this is true. One, it's a very risky thing to do. And two, there are more than enough exploitable security vulnerabilities...schneier From Schneier on Security | December 17, 2010 at 04:49 PM
They can be used to scam Amazon Marketplace merchants:
What happens once our scammer is armed with his fake receipt? Well, many sellers on Amazon will ask you...schneier From Schneier on Security | December 17, 2010 at 12:28 PM
There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something...Schneier From Schneier on Security | December 16, 2010 at 02:23 PM
They're causing problems:
A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...schneier From Schneier on Security | December 14, 2010 at 07:12 PM
Interesting profile of Evan Kohlmann:
Evan Kohlmann spends his days lurking in the darkest corners of the Internet, where jihadists recruit sympathizers from across...schneier From Schneier on Security | December 14, 2010 at 11:35 AM
This shouldn't be a surprise:
Karsten Nohl's assessment of dozens of car makes and models found weaknesses in the way immobilisers are integrated with the rest...schneier From Schneier on Security | December 13, 2010 at 08:02 PM
Sex attack caught on camera.
Hamilton police have arrested two men after a sex attack on a woman early today was caught on the city's closed circuit television...schneier From Schneier on Security | December 13, 2010 at 08:01 PM
Against stupid CRB checks:
Last January, Annabel Hayter, chairwoman of Gloucester Cathedral Flower Guild, received an email saying that she and her 60 fellow flower...schneier From Schneier on Security | December 13, 2010 at 12:42 PM
I experienced a new TSA security check at Phoenix Airport last Thursday. The agent took my over-three-ounce bottle of saline, put a drop of it on a white cardboard...schneier From Schneier on Security | December 10, 2010 at 08:11 PM
Yesterday, NIST announced the five hash functions to advance to the third (and final) round in the SHA-3 selection process: BLAKE, Grøstl, JH, Keccak, and Skein...schneier From Schneier on Security | December 10, 2010 at 06:04 PM
Iscon uses infrared light rather than X-rays. I have no idea how well it works.
And Rapiscan has a new patent:
Abstract:
The present invention is directed towards...schneier From Schneier on Security | December 10, 2010 at 12:22 PM
A DHS video message, reminding people to look out for and report suspicious activity, will be displayed at WalMart stores around the country.
schneier From Schneier on Security | December 9, 2010 at 06:22 PM
I don't have a lot to say about WikiLeaks, but I do want to make a few points.
1. Encryption isn't the issue here. Of course the cables were encrypted, for transmission...schneier From Schneier on Security | December 9, 2010 at 11:50 AM
This seems not to be a joke:
The American Civil Liberties Union has filed a lawsuit against the state after it refused to release the construction plans for a...schneier From Schneier on Security | December 8, 2010 at 08:27 PM
From Michael Leiter, the director of the National Counterterrorism Center:
Ultimately, Leiter said, it'll be the "quiet, confident resilience" of Americans after...schneier From Schneier on Security | December 8, 2010 at 01:10 PM
Masters Thesis from the Naval Postgraduate School: "Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our...schneier From Schneier on Security | December 7, 2010 at 12:43 PM
The U.S. Federal Trade Commission released its privacy report: "Protecting Consumer Privacy in an Era of Rapid Change."
From the press release:
One method of...schneier From Schneier on Security | December 6, 2010 at 07:52 PM
The world is gearing up for cyberwar. The U.S. Cyber Command became operational in November. NATO has enshrined cyber security among its new strategic priorities...schneier From Schneier on Security | December 6, 2010 at 12:42 PM