From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor.
P. 495:
The guy was using a fairly simple buffer overflow attack but withEvery...schneier From Schneier on Security | November 13, 2009 at 08:43 PM
Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
schneier From Schneier on Security | November 13, 2009 at 07:47 PM
[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...schneier From Schneier on Security | November 13, 2009 at 11:31 AM
It's conventional wisdom that the legal "wall" between intelligence and law enforcement was one of the reasons we failed to prevent 9/11. The 9/11 Comission evaluated...schneier From Schneier on Security | November 12, 2009 at 08:26 PM
In the past, our relationship with our computers was technical. We cared what CPU they had and what software they ran. We understood our networks and how they worked...schneier From Schneier on Security | November 12, 2009 at 09:29 AM
We've seen lots of rumors about attacks against the power grid, both in the U.S. and elsewhere, of people hacking the power grid. Seems like the source of these...schneier From Schneier on Security | November 11, 2009 at 06:19 PM
It's obvious why if you think about it:
Thieves prefer to steal black luggage because so much of it looks alike. If the thief is caught red-handed by the bag's...schneier From Schneier on Security | November 11, 2009 at 09:56 AM
Interesting research: "Countering Kernel Rootkits with Lightweight Hook
Protection," by Zhi Wang, Xuxian Jiang, Weidong Cui, and and Peng Ning.
Abstract: Kernel...schneier From Schneier on Security | November 10, 2009 at 07:26 PM
Security is never black and white. If someone asks, "for best security, should I do A or B?" the answer almost invariably is both. But security is always a trade...schneier From Schneier on Security | November 10, 2009 at 11:51 AM
I have refrained from commenting on the case against Najibullah Zazi, simply because it's so often the case that the details reported in the press have very little...schneier From Schneier on Security | November 9, 2009 at 06:15 PM
Recently I wrote about the difficulty of making role-based access control work, and how reasearch at Dartmouth showed that it was better to let people take theThis...schneier From Schneier on Security | November 9, 2009 at 12:59 PM
A divining rod to find explosives in Iraq:
ATSC’s promotional material claims that its device can find guns, ammunition, drugs, truffles, human bodies and even...schneier From Schneier on Security | November 6, 2009 at 09:40 AM
From the Open Access Journal of Forensic Psychology, by a whole llist of authors: "A Call for Evidence-Based Security Tools":
Abstract: Since the 2001 attacks...schneier From Schneier on Security | November 5, 2009 at 12:11 PM
It was unattended in a hotel room at the time:
Israel's Mossad espionage agency used Trojan Horse programs to gather intelligence about a nuclear facility in Syria...schneier From Schneier on Security | November 5, 2009 at 09:39 AM
It's hard work being prey. Watch the birds at a feeder. They're constantly on alert, and will fly away from food -- from easy nutrition -- at the slightest movement...schneier From Schneier on Security | November 4, 2009 at 01:51 PM
Recent stories have documented the ridiculous effects of zero-tolerance weapons policies in a Delaware school district: a first-grader expelled for taking a camping...schneier From Schneier on Security | November 3, 2009 at 04:40 PM
Really:
The technology relies on recognising a pheromone - or scent signal - produced in sweat when a person is scared.
Researchers hope the ''fear detector''...schneier From Schneier on Security | November 3, 2009 at 11:25 AM