From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Who knew?
"Hulse was shooting with burst mode on his camera, so I know exactly what the interval is between the frames and I can calculate velocity of squid flying...schneier From Schneier on Security | August 20, 2010 at 09:02 PM
Intel McAfee.
It's another example of a large non-security company buying a security company. I've been talking about this sort of thing for two and a half years...schneier From Schneier on Security | August 19, 2010 at 04:26 PM
Good essay by Seth Godin:
We pay the fear tax every time we spend time or money seeking reassurance. We pay it twice when the act of seeking that reassurance actually...schneier From Schneier on Security | August 18, 2010 at 08:48 PM
The Crypto 2010 Conference is going on right now at the University of California, Santa Barbara. Springer-Verlag publishes the proceedings, but they're available...schneier From Schneier on Security | August 17, 2010 at 05:29 PM
Still minor, but this kind of thing is only going to get worse:
The new research shows that other systems in the vehicle are similarly insecure. The tire pressure...schneier From Schneier on Security | August 17, 2010 at 11:42 AM
In seconds.
Garage doors with automatic openers have always seemed like a lot of security theater to me.
schneier From Schneier on Security | August 16, 2010 at 11:51 AM
It wasn't me:
A hardened computer hacker has been arrested on suspicion of writing a computer virus that systematically destroys all the files on victims' PCs...schneier From Schneier on Security | August 13, 2010 at 09:23 PM
Clever attack.
After researching how gift cards work, Zepeda purchased a magnetic card reader online, began stealing blank gift cards, on display for purchase,...schneier From Schneier on Security | August 13, 2010 at 12:36 PM
"Smudge Attacks on Smartphone Touch Screens":
Abstract: Touch screens are an increasingly common feature on personal computing devices, especially smartphones...schneier From Schneier on Security | August 12, 2010 at 11:48 AM
Facebook Privacy Settings: Who Cares?" by danah boyd and Eszter Hargittai.
Abstract: With over 500 million users, the decisions that Facebook makes about its...schneier From Schneier on Security | August 11, 2010 at 11:00 AM
Lately I've been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but I'm...schneier From Schneier on Security | August 10, 2010 at 11:51 AM
There's a new paper circulating that claims to prove that P ? NP. The paper has not been refereed, and I haven't seen any independent verifications or refutations...schneier From Schneier on Security | August 9, 2010 at 07:46 PM
Interesting:
According to Moffett, we might actually learn a thing or two from how ants wage war. For one, ant armies operate with precise organization despite...schneier From Schneier on Security | August 9, 2010 at 12:12 PM
Worked well in a test:
For the first time, the Northwestern researchers used the P300 testing in a mock terrorism scenario in which the subjects are planning,More...schneier From Schneier on Security | August 6, 2010 at 10:36 AM
Most people might not be aware of it, but there's a National Cryptologic Museum at Ft. Meade, at NSA Headquarters. It's hard to know its exact relationship with...schneier From Schneier on Security | August 5, 2010 at 11:36 AM
Now this is an interesting development:
In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents...schneier From Schneier on Security | August 4, 2010 at 12:52 PM
The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them.
At the heart of the battle is access to thecomplicated...schneier From Schneier on Security | August 3, 2010 at 04:08 PM