From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Two interesting research papers on website password policies.
"Where Do Security Policies Come From?":
Abstract: We examine the password policies of 75 different...schneier From Schneier on Security | July 20, 2010 at 06:52 PM
From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...schneier From Schneier on Security | July 20, 2010 at 11:43 AM
From Wired News:
The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...schneier From Schneier on Security | July 19, 2010 at 06:11 PM
Symbiotic relationship between the Hawaiian bobtail squid and bioluminescent bacteria, with bonus security implications.
schneier From Schneier on Security | July 16, 2010 at 09:34 PM
Someone claims to have reverse-engineered Skype's proprietary encryption protocols, and has published pieces of it.
If the crypto is good, this is less of a big...schneier From Schneier on Security | July 16, 2010 at 05:08 PM
In what creepy back room do they come up with these names?
The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults...schneier From Schneier on Security | July 16, 2010 at 10:19 AM
This is interesting:
Some of the scenarios where we have installed video analytics for our clients include:
to detect someone walking in an area of their yard...schneier From Schneier on Security | July 14, 2010 at 05:54 PM
It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...schneier From Schneier on Security | July 14, 2010 at 11:51 AM
From 1955, intended as humor:
In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...schneier From Schneier on Security | July 13, 2010 at 05:42 PM
The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...schneier From Schneier on Security | July 13, 2010 at 12:21 PM
Try to keep up:
Leslie Van Houten, a one-time member of Charles Manson's infamous 'family' is up for parole for the 17th time today....
"These are serial killers...schneier From Schneier on Security | July 12, 2010 at 05:54 PM
Last month, Sen. Joe Lieberman, I-Conn., introduced a bill that might -- we're not really sure -- give the president the authority to shut down all or portionsproposed...schneier From Schneier on Security | July 12, 2010 at 12:07 PM
Riddles of squid sex:
All cephalopods are hindered by their body shape, which comprises a closed hood-type structure called a mantle, which forms most of what...schneier From Schneier on Security | July 9, 2010 at 09:02 PM
The measures used to prevent cheating during tests remind me of casino security measures:
No gum is allowed during an exam: chewing could disguise a studentschneier From Schneier on Security | July 9, 2010 at 11:34 AM