From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Old -- but recently released -- document discussing the bugging of the Russian embassy in 1940. The document also mentions bugging the embassies of France, Germany...schneier From Schneier on Security | October 27, 2010 at 08:24 PM
Firesheep is a new Firefox plugin that makes it easy for you to hijack other people's social network connections. Basically, Facebook authenticates clients with...schneier From Schneier on Security | October 27, 2010 at 12:53 PM
It's a long list. These items are not online; they're at the National Archives and Records Administration in College Park, MD. You can either ask for copies by...schneier From Schneier on Security | October 25, 2010 at 11:21 AM
Really:
While the notion that a few animals produce polarization signals and use them in communication is not new, Mschneier From Schneier on Security | October 22, 2010 at 09:31 PM
Once a user has logged into FaceTime, anyone with access to the machine can change the user's Apple ID password without knowing the old password.
schneier From Schneier on Security | October 22, 2010 at 10:45 AM
Clever:
Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles...schneier From Schneier on Security | October 21, 2010 at 07:07 PM
I am the program chair for WEIS 2011, which is to be held next June in Washington, DC.
Submissions are due at the end of February.
Please forward and repost the...schneier From Schneier on Security | October 21, 2010 at 12:11 AM
This isn't good:
Intelligent Integration Systems (IISi), a small Boston-based software development firm, alleges that their Geospatial Toolkit and Extended SQL...schneier From Schneier on Security | October 20, 2010 at 12:21 PM
Ha!
When he's out and about near his Denver home, former Broncos quarterback John Elway has come up with a novel way to travel incognitoschneier From Schneier on Security | October 19, 2010 at 12:34 PM
This is clever:
The tool is called PinDr0p, and works by analysing the various characteristic noise artifacts left in audio by the different types of voice network...schneier From Schneier on Security | October 18, 2010 at 11:23 AM
India is writing its own operating system so it doesn't have to rely on Western technology:
India's Defence Research and Development Organisation (DRDO) wants...schneier From Schneier on Security | October 15, 2010 at 03:44 PM
Interesting new technology.
Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...schneier From Schneier on Security | October 14, 2010 at 05:10 PM
Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...schneier From Schneier on Security | October 14, 2010 at 11:35 AM
They're tracking a college student in Silicon Valley. He's 20, partially Egyptian, and studying marketing at Mission College. He found the tracking device attached...schneier From Schneier on Security | October 13, 2010 at 11:20 AM
Remember the Mahmoud al-Mabhouh assassination last January? The police identified 30 suspects, but haven't been able to find any of them.
Police spent about 10...schneier From Schneier on Security | October 12, 2010 at 11:12 AM
From Slate:
We do nothing, first and foremost, because there is nothing we can do. Unless the State Department gets specificschneier From Schneier on Security | October 8, 2010 at 05:49 PM