From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Yesterday, DHS Secretary Janet Napolitano said that the U.S. needed to hire 1,000 cybersecurity experts over the next three years. Bob Cringly doubts that there...schneier From Schneier on Security | October 9, 2009 at 04:33 PM
This is just silly:
Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...Schneier From Schneier on Security | October 9, 2009 at 09:39 AM
Interesting:
Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...Schneier From Schneier on Security | October 8, 2009 at 09:33 AM
This is interesting:
Since then, his scams have tended to take place in luxury hotels around the world.
Typically, he would arrive at a hotel, claim to be a guest...schneier From Schneier on Security | October 7, 2009 at 06:07 PM
I'm dubious:
At a demonstration of the technology this week, project manager Robert P. Burns said the idea is to track a set of involuntary physiological reactions...schneier From Schneier on Security | October 7, 2009 at 05:54 PM
Witnesses are much more accurate at identifying criminals when computers assist in the identification process, not police officers.
A major cause of miscarriages...schneier From Schneier on Security | October 7, 2009 at 12:12 PM
You'd think this would be obvious:
Douglas Havard, 27, serving six years for stealing up to schneier From Schneier on Security | October 6, 2009 at 07:32 PM
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...schneier From Schneier on Security | October 6, 2009 at 11:40 AM
Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...schneier From Schneier on Security | October 5, 2009 at 08:10 PM
It's a security risk:
The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...schneier From Schneier on Security | October 5, 2009 at 06:29 PM
For the U.N. General Assembly:
For those entranced by security theater, New York City is a sight to behold this week. A visit to one of the two centers of the...schneier From Schneier on Security | October 2, 2009 at 05:23 PM
This is interesting:
Professor Gernot Heiser, the John Lions Chair in Computer Science in the School of Computer Science and Engineering and a senior principal...Schneier From Schneier on Security | October 2, 2009 at 09:25 AM
During a daring bank robbery in Sweden that involved a helicopter, the criminals disabled a police helicopter by placing a package with the word "bomb" near the...Schneier From Schneier on Security | October 1, 2009 at 10:50 AM
Reproducing keys from distant and angled photographs:
Abstract:The access control provided by a physical lock is based on the assumption that the information content...Schneier From Schneier on Security | October 1, 2009 at 09:27 AM
New experiment demonstrates what we already knew:
That's because people tend to view their immediate emotions, such as their perceptions of threats or risks, as...schneier From Schneier on Security | September 30, 2009 at 06:17 PM
Crypteto has a 49,152-bit symmetric key:
The most important issue of any encryption product is the 'bit key strength'. To date the strongest known algorithm has...schneier From Schneier on Security | September 30, 2009 at 10:52 AM