From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I've gotten to the front of the security line and handed the TSA officer my ID and ticket.
TSA Officer: (Looks at my ticket. Looks at my ID. Looks at me. Smiles...schneier From Schneier on Security | May 24, 2010 at 07:29 PM
Interesting research: "What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors," by Jon Howell and Stuart Schechter...schneier From Schneier on Security | May 24, 2010 at 12:32 PM
This is an interesting piece of research evaluating different user interface designs by which applications disclose to users what sort of authority they need to...schneier From Schneier on Security | May 21, 2010 at 06:17 PM
"Experimental Security Analysis of a Modern Automobile," by a whole mess of authors:
Abstract: Modern automobiles are no longer mere mechanical devices; they are...schneier From Schneier on Security | May 21, 2010 at 11:56 AM
Interesting research.
Main results:
[...]
We analyzed the results from over a quarter of a million people who ran our tests in the last few months, and found...schneier From Schneier on Security | May 20, 2010 at 06:28 PM
Dolphine and sea lions:
A Navy seal - actually a sea lion - took less than a minute to find a fake mine under a pier near San Francisco's AT&T Park.
A dolphin...schneier From Schneier on Security | May 20, 2010 at 11:50 AM
This doesn't seem like the best idea:
Authorities in the southern Indian state of Andhra Pradesh are planning to set up an outsourcing unit in a jail.
The unit...schneier From Schneier on Security | May 18, 2010 at 12:29 PM
Sounds like fearmongering to me.
How real is the threat? Many of the world's most dangerous pathogens already are transmitted by arthropods, the animal phylum...schneier From Schneier on Security | May 17, 2010 at 06:30 PM
The British High Court ruled that a software vendor's EULA -- which denied all liability for poor software -- was not reasonable.
I wrote about software liabilities...schneier From Schneier on Security | May 17, 2010 at 11:18 AM
It's still only in the lab, but nothing detects it right now:
The attack is a clever "bait-and-switch" style move. Harmless code is passed to the security software...schneier From Schneier on Security | May 14, 2010 at 04:50 PM
On April 1, I announced the Fifth Annual Movie Plot Threat Contest:
Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...schneier From Schneier on Security | May 14, 2010 at 11:51 AM
At a security conference recently, the moderator asked the panel of distinguished cybersecurity leaders what their nightmare scenario was. The answers were the...schneier From Schneier on Security | May 13, 2010 at 09:33 AM
That slogan is owned by New York's Metropolitan Transit Authority (the MTA).
Since obtaining the trademark in 2007, the authority has granted permission to use...schneier From Schneier on Security | May 12, 2010 at 12:08 PM
Cool idea, or dumb idea?
Its features include:
Fingerprint access only
Bluetooth enabled for notification alertsschneier From Schneier on Security | May 11, 2010 at 05:27 PM