From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is interesting:
Professor Gernot Heiser, the John Lions Chair in Computer Science in the School of Computer Science and Engineering and a senior principal...Schneier From Schneier on Security | October 2, 2009 at 09:25 AM
During a daring bank robbery in Sweden that involved a helicopter, the criminals disabled a police helicopter by placing a package with the word "bomb" near the...Schneier From Schneier on Security | October 1, 2009 at 10:50 AM
Reproducing keys from distant and angled photographs:
Abstract:The access control provided by a physical lock is based on the assumption that the information content...Schneier From Schneier on Security | October 1, 2009 at 09:27 AM
New experiment demonstrates what we already knew:
That's because people tend to view their immediate emotions, such as their perceptions of threats or risks, as...schneier From Schneier on Security | September 30, 2009 at 06:17 PM
Crypteto has a 49,152-bit symmetric key:
The most important issue of any encryption product is the 'bit key strength'. To date the strongest known algorithm has...schneier From Schneier on Security | September 30, 2009 at 10:52 AM
The average American commits three felonies a day: the title of a new book by Harvey Silverglate. More specifically, the problem is the intersection of vague laws...schneier From Schneier on Security | September 29, 2009 at 06:08 PM
Turns out "gaydar" can be automated:
Using data from the social network Facebook, they made a striking discovery: just by looking at a person's online friends,...schneier From Schneier on Security | September 29, 2009 at 12:13 PM
In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something...schneier From Schneier on Security | September 28, 2009 at 06:34 PM
Nobody tell the TSA, but last month someone tried to assassinate a Saudi prince by exploding a bomb stuffed in his rectum. He pretended to be a repentant militant...schneier From Schneier on Security | September 28, 2009 at 11:19 AM
First one sighted in the Gulf since 1954:
The new specimen, weighing 103 pounds, was found during a preliminary survey of the Gulf during which scientists hope...schneier From Schneier on Security | September 25, 2009 at 06:04 PM
Texas Instruments' calculators use RSA digital signatures to authenticate any updates to their operating system. Unfortunately, their signing keys are too short...schneier From Schneier on Security | September 25, 2009 at 11:17 AM
It's not just hackers who steal financial and medical information:
Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invitedSony...schneier From Schneier on Security | September 24, 2009 at 11:37 AM
I already blogged about this; there's more information in this new article:
Included in the items the German army allowed humanitarian groups to distribute in...schneier From Schneier on Security | September 23, 2009 at 06:43 PM
This is a good thing:
An Illinois district court has allowed a couple to sue their bank on the novel grounds that it may have failed to sufficiently secure their...Schneier From Schneier on Security | September 23, 2009 at 11:00 AM
Back in 2005, I wrote about the failure of two-factor authentication to mitigate banking fraud:
Here are two new active attacks we're starting to see:
Man-in-the...schneier From Schneier on Security | September 22, 2009 at 11:39 AM
This is an important development:
Shor's algorithm was first demonstrated in a computing system based on nuclear magnetic resonance -- manipulating molecules in...schneier From Schneier on Security | September 22, 2009 at 11:01 AM
Interesting:
For nine months, Eagle's team recorded data from the phones of 94 students and staff at MIT. By using blue-tooth technology and phone masts, theyabstract...schneier From Schneier on Security | September 21, 2009 at 06:41 PM
Good essay on "terrorist havens" -- like Afghanistan -- and why they're not as big a worry as some maintain:
Rationales for maintaining the counterinsurgency in...schneier From Schneier on Security | September 21, 2009 at 11:46 AM