From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Sounds like it was easy:
Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer...schneier From Schneier on Security | October 8, 2010 at 11:23 AM
From the Journal of Homeland Security and Emergency Management: "Politics or Risks? An Analysis of Homeland Security Grant Allocations to the States."
Abstract...schneier From Schneier on Security | October 7, 2010 at 12:03 PM
Computer security experts are often surprised at which stories get picked up by the mainstream media. Sometimes it makes no sense. Why this particular data breach...schneier From Schneier on Security | October 7, 2010 at 10:16 AM
This will help some.
At least two rival systems plan to put unique codes on packages containing antimalarials and other medications. Buyers will be able to text...schneier From Schneier on Security | October 6, 2010 at 11:59 AM
New research: "Attacks and Design of Image Recognition CAPTCHAs."
Abstract. We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper...schneier From Schneier on Security | October 5, 2010 at 12:22 PM
I regularly say that security decisions are primarily made for non-security reasons. This article about the placement of sky marshals on airplanes is an excellent...schneier From Schneier on Security | October 4, 2010 at 06:55 PM
Not their online behavior at work, but their online behavior in life.
Using automation software that slogs through Facebook, Twitter, Flickr, YouTube, LinkedIn...schneier From Schneier on Security | October 4, 2010 at 11:31 AM
Okay, so this isn't a normal blog post.
It's not about security.
I've been playing doumbek with a band at the Minneapolis Renaissance Festival called Brother...schneier From Schneier on Security | October 1, 2010 at 07:43 PM
During the cyberwar debate a few months ago, I said this:
If we frame this discussion as a war discussion, then what you do when there's a threat of war is you...schneier From Schneier on Security | October 1, 2010 at 03:19 PM
This is a list of master's theses from the Naval Postgraduate School's Center for Homeland Defense and Security, this year.
Some interesting stuff in there....schneier From Schneier on Security | October 1, 2010 at 11:34 AM
On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet. Technologies...schneier From Schneier on Security | September 30, 2010 at 11:02 AM
Clever:
The burglars broke into their latest store near Paris and drilled a hole in the "pneumatic tube" that siphons money from the checkout to the strong-room...schneier From Schneier on Security | September 28, 2010 at 07:42 PM
This is no surprise:
The people behind the new study start by asking a pretty obvious question: "Why do members of the public disagreeschneier From Schneier on Security | September 28, 2010 at 11:33 AM
It's better to try to isolate parts of a terrorist network than to attempt to destroy it as a whole, at least according to this model:
Vos Fellman explains how...schneier From Schneier on Security | September 27, 2010 at 05:00 PM
It's serious:
The problem lies in the way that ASP.NET, Microsoft's popular Web framework, implements the AES encryption algorithm to protect the integrity ofdemo...schneier From Schneier on Security | September 27, 2010 at 11:51 AM
In an article about Robert Woodward's new book, Obama's Wars, this is listed as one of the book's "disclosures":
A new capability developed by the National Security...schneier From Schneier on Security | September 24, 2010 at 06:23 PM