Friday Squid Blogging: Do Squid Have Emotions?

Scientists are now debating whether octopuses, squid, and crabs have emotions. Short answer: we don’t know, but can’t rule it out. There may be a point when humans can no longer assume that crayfish, shrimp, and other invertebrates don’t feel pain and other emotions. “If they can … | Continue reading


@schneier.com | 2 years ago

AirTags Are Used for Stalking Far More than Previously Reported

Ever since Apple introduced AirTags, security people have warned that they could be used for stalking. But while there have been a bunch of anecdotal stories, this is the first vaguely scientific survey: Motherboard requested records mentioning AirTags in a recent eight month per … | Continue reading


@schneier.com | 2 years ago

US Disrupts Russian Botnet

The Justice Department announced the disruption of a Russian GRU-controlled botnet: The Justice Department today announced a court-authorized operation, conducted in March 2022, to disrupt a two-tiered global botnet of thousands of infected network hardware devices under the cont … | Continue reading


@schneier.com | 2 years ago

Cyberweapons Arms Manufacturer FinFisher Shuts Down

FinFisher has shut down operations. This is the spyware company whose products were used, among other things, to spy on Turkish and Bahraini political opposition. | Continue reading


@schneier.com | 2 years ago

Hackers Using Fake Police Data Requests against Tech Companies

Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typi … | Continue reading


@schneier.com | 2 years ago

Wyze Camera Vulnerability

Wyze ignored a vulnerability in its home security cameras for three years. Bitdefender, who discovered the vulnerability, let the company get away with it. In case you’re wondering, no, that is not normal in the security community. While experts tell me that the concept of a “res … | Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Squid Migration and Climate Change

New research on the changing migration of the Doryteuthis opalescens as a result of climate change. News article: Stanford researchers have solved a mystery about why a species of squid native to California has been found thriving in the Gulf of Alaska about 1,800 miles north of … | Continue reading


@schneier.com | 2 years ago

Bypassing Two-Factor Authentication

These techniques are not new, but they’re increasingly popular: …some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a hurdle for some hackers to clear. In the past few months, suspected script kiddies like the Lapsus$ data ex … | Continue reading


@schneier.com | 2 years ago

Chrome Zero-Day from North Korea

North Korean hackers have been exploiting a zero-day in Chrome. The flaw, tracked as CVE-2022-0609, was exploited by two separate North Korean hacking groups. Both groups deployed the same exploit kit on websites that either belonged to legitimate organizations and were hacked or … | Continue reading


@schneier.com | 2 years ago

Stalking with an Apple Watch

The malicious uses of these technologies are scary: Police reportedly arrived on the scene last week and found the man crouched beside the woman’s passenger side door. According to the police, the man had, at some point, wrapped his Apple Watch across the spokes of the woman’s pa … | Continue reading


@schneier.com | 2 years ago

A Detailed Look at the Conti Ransomware Gang

Based on two years of leaked messages, 60,000 in all: The Conti ransomware gang runs like any number of businesses around the world. It has multiple departments, from HR and administrators to coders and researchers. It has policies on how its hackers should process their code, an … | Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Unexpectedly Low Squid Population in the Arctic

Research: Abstract: The retreating ice cover of the Central Arctic Ocean (CAO) fuels speculations on future fisheries. However, very little is known about the existence of harvestable fish stocks in this 3.3 million­–square kilometer ecosystem around the North Pole. Crossing the … | Continue reading


@schneier.com | 2 years ago

Gus Simmons’s Memoir

Gus Simmons is an early pioneer in cryptography and computer security. I know him best for his work on authentication and covert channels, specifically as related to nuclear treaty verification. His work is cited extensively in Applied Cryptography. He has written a memoir of gro … | Continue reading


@schneier.com | 2 years ago

Linux Improves Its Random Number Generator

In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security improvement. | Continue reading


@schneier.com | 2 years ago

NASA’s Insider Threat Program

The Office of Inspector General has audited NASA’s insider threat program: While NASA has a fully operational insider threat program for its classified systems, the vast majority of the Agency’s information technology (IT) systems — including many containing high-value assets or … | Continue reading


@schneier.com | 2 years ago

White House Warns of Possible Russian Cyberattacks

News: The White House has issued its starkest warning that Russia may be planning cyberattacks against critical-sector U.S. companies amid the Ukraine invasion. […] Context: The alert comes after Russia has lobbed a series of digital attacks at the Ukrainian government and critic … | Continue reading


@schneier.com | 2 years ago

Developer Sabotages Open-Source Software Package

This is a big deal: A developer has been caught adding malicious code to a popular open-source package that wiped files on computers located in Russia and Belarus as part of a protest that has enraged many users and raised concerns about the safety of free and open source softwar … | Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: The Costs of Unregulated Squid Fishing

Greenpeace has published a report, “Squids in the Spotlight,” on the extent and externalities of global squid fishing. News article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines h … | Continue reading


@schneier.com | 2 years ago

Why Vaccine Cards Are So Easily Forged

My proof of COVID-19 vaccination is recorded on an easy-to-forge paper card. With little trouble, I could print a blank form, fill it out, and snap a photo. Small imperfections wouldn’t pose any problem; you can’t see whether the paper’s weight is right in a digital image. When I … | Continue reading


@schneier.com | 2 years ago

“Change Password”

Oops: Instead of telling you when it’s safe to cross the street, the walk signs in Crystal City, VA are just repeating ‘CHANGE PASSWORD.’ Something’s gone terribly wrong here. | Continue reading


@schneier.com | 2 years ago

Breaking RSA through Insufficiently Random Primes

Basically, the SafeZone library doesn’t sufficiently randomize the two prime numbers it used to generate RSA keys. They’re too close to each other, which makes them vulnerable to recovery. There aren’t many weak keys out there, but there are some: So far, Böck has identified only … | Continue reading


@schneier.com | 2 years ago

US Critical Infrastructure Companies Will Have to Report When They Are Hacked

This will be law soon: Companies critical to U.S. national interests will now have to report when they’re hacked or they pay ransomware, according to new rules approved by Congress. […] The reporting requirement legislation was approved by the House and the Senate on Thursday and … | Continue reading


@schneier.com | 2 years ago

Upcoming Speaking Events

This is a current list of where and when I am scheduled to speak: I’m participating in an online panel discussion on “Ukraine and Russia: The Online War,” hosted by UMass Amherst, at 5:00 PM Eastern on March 31, 2022. I’m speaking at Future Summits in Antwerp, Belgium on May 18, … | Continue reading


@schneier.com | 2 years ago

Leak of Russian Censorship Data

The transparency organization Distributed Denial of Secrets has released 800GB of data from Roskomnadzor, the Russian government censorship organization. Specifically, Distributed Denial of Secrets says the data comes from the Roskomnadzor of the Republic of Bashkortostan. The Re … | Continue reading


@schneier.com | 2 years ago

Friday Squid Blog: 328-million-year-old Vampire Squid Ancestor Discovered

A fossilized ancestor of the vampire squid — with ten arms — was discovered and named Syllipsimopodi bideni after President Biden. Here’s the research paper. Note: Vampire squids are not squids. (Yes, it’s weird.) As usual, you can also use this squid post to talk about the secur … | Continue reading


@schneier.com | 2 years ago

Where’s the Russia-Ukraine Cyberwar?

It has been interesting to notice how unimportant and ineffective cyber operations have been in the Russia-Ukraine war. Russia launched a wiper against Ukraine at the beginning, but it was found and neutered. Near as I can tell, the only thing that worked was the disabling of reg … | Continue reading


@schneier.com | 2 years ago

Fraud on Zelle

Continue reading


@schneier.com | 2 years ago

Using Radar to Read Body Language

Continue reading


@schneier.com | 2 years ago

Hacking Alexa through Alexa’s Speech

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Far Side Cartoon

Continue reading


@schneier.com | 2 years ago

Samsung Encryption Flaw

Continue reading


@schneier.com | 2 years ago

Details of an NSA Hacking Operation

Continue reading


@schneier.com | 2 years ago

Vulnerability in Stalkerware Apps

Continue reading


@schneier.com | 2 years ago

Decrypting Hive Ransomware Data

Continue reading


@schneier.com | 2 years ago

Insurance Coverage for NotPetya Losses

Continue reading


@schneier.com | 2 years ago

Attack Attribution in Cyberspace (2015)

Continue reading


@schneier.com | 2 years ago

Privacy Violating COVID Tests

Continue reading


@schneier.com | 2 years ago

An Elaborate Employment Con in the Internet Age

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Squid Videos

Continue reading


@schneier.com | 2 years ago

Bypassing Apple’s AirTag Security

Continue reading


@schneier.com | 2 years ago

A New Cybersecurity “Social Contract”

Continue reading


@schneier.com | 2 years ago

Stealing Bicycles by Swapping QR Codes

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: South American Squid Stocks Threatened by Chinese Fishing

Continue reading


@schneier.com | 2 years ago

Possible Government Surveillance of the Otter.ai Transcription App

Continue reading


@schneier.com | 2 years ago

Vendors are Fixing Security Flaws Faster

Continue reading


@schneier.com | 2 years ago

Secret CIA Data Collection Program

Continue reading


@schneier.com | 2 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Climate Change Causing “Squid Bloom” along Pacific Coast

Continue reading


@schneier.com | 2 years ago