From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Worked well in a test:
For the first time, the Northwestern researchers used the P300 testing in a mock terrorism scenario in which the subjects are planning,More...schneier From Schneier on Security | August 6, 2010 at 10:36 AM
Most people might not be aware of it, but there's a National Cryptologic Museum at Ft. Meade, at NSA Headquarters. It's hard to know its exact relationship with...schneier From Schneier on Security | August 5, 2010 at 11:36 AM
Now this is an interesting development:
In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents...schneier From Schneier on Security | August 4, 2010 at 12:52 PM
The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them.
At the heart of the battle is access to thecomplicated...schneier From Schneier on Security | August 3, 2010 at 04:08 PM
Location-based encryption -- a system by which only a recipient in a specific location can decrypt the message -- fails because location can be spoofed. Now asolved...schneier From Schneier on Security | August 3, 2010 at 11:25 AM
Seems there are a lot of them. They do it for marketing purposes. Really, they seem to do it because the code base they use does it automatically or just because...schneier From Schneier on Security | August 3, 2010 at 02:21 AM
David Ropeik is a writer and consultant who specializes in risk perception and communication. His book, How Risky Is It, Really?: Why Our Fears Don't Always Match...schneier From Schneier on Security | August 2, 2010 at 09:20 AM
Selling fear:
The Vivos network, which offers partial ownerships similar to a timeshare in underground shelter communities, is one of several ventures touting...schneier From Schneier on Security | July 30, 2010 at 05:47 PM
Hacking ATMs to spit out money, demonstrated at the Black Hat conference:
The two systems he hacked on stage were made by Triton and Tranax. The Tranax hack was...schneier From Schneier on Security | July 30, 2010 at 01:55 PM
"Who controls the off switch?" by Ross Anderson and Shailendra Fuloria.
Abstract: We're about to acquire a significant new cybervulnerability. The world's energy...schneier From Schneier on Security | July 29, 2010 at 09:40 AM
The DNSSEC root key has been divided among seven people:
Part of ICANN's security scheme is the Domain Name System Security, a security protocol that ensures Web...schneier From Schneier on Security | July 28, 2010 at 04:12 PM
Okay, this is just weird:
Mark S. Price, a specialist in public security, and his privately held company, Paradise Lost Antiterrorism Network of America (www.plan...schneier From Schneier on Security | July 27, 2010 at 05:33 PM
It's a service:
The mechanism used involves captured network traffic, which is uploaded to the WPA Cracker service and subjected to an intensive brute force cracking...schneier From Schneier on Security | July 27, 2010 at 11:43 AM
An article from The Economist makes a point that I have been thinking about for a while: the modern technology makes life harder for spies, not easier. It used...schneier From Schneier on Security | July 26, 2010 at 11:12 AM
Where do these TV shows come from?
Follows the adventures of the Cuylers, an impoverished and dysfunctional family of anthropomorphic, air-breathing, redneck squids...schneier From Schneier on Security | July 23, 2010 at 09:19 PM
The Washington Post has published a phenomenal piece of investigative journalism: a long, detailed, and very interesting expose on the U.S. intelligence industry...schneier From Schneier on Security | July 23, 2010 at 05:46 PM
Stuxnet is a new Internet worm that specifically targets Siemens WinCC SCADA systems: used to control production at industrial plants such as oil rigs, refineries...schneier From Schneier on Security | July 23, 2010 at 01:59 PM
Interesting:
The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...schneier From Schneier on Security | July 22, 2010 at 11:41 AM