On the Irish Health Services Executive Hack

Continue reading


@schneier.com | 2 years ago

Bunnie Huang’s Plausibly Deniable Database

Continue reading


@schneier.com | 2 years ago

Breaking 256-bit Elliptic Curve Encryption with a Quantum Computer

Continue reading


@schneier.com | 2 years ago

Amy Zegart on Spycraft in the Internet Age

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Are Squid from Another Planet?

Continue reading


@schneier.com | 2 years ago

The EARN IT Act Is Back

Continue reading


@schneier.com | 2 years ago

Interview with the Head of the NSA’s Research Directorate

Continue reading


@schneier.com | 2 years ago

Finding Vulnerabilities in Open Source Projects

Continue reading


@schneier.com | 2 years ago

Me on App Store Monopolies and Security

Continue reading


@schneier.com | 2 years ago

Twelve-Year-Old Linux Vulnerability Discovered and Patched

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Cephalopods Thirty Million Years Older Than Previously Thought

Continue reading


@schneier.com | 2 years ago

Tracking Secret German Organizations with Apple AirTags

Continue reading


@schneier.com | 2 years ago

New DeadBolt Ransomware Targets NAT Devices

Continue reading


@schneier.com | 2 years ago

Merck Wins Insurance Lawsuit re NotPetya Attack

Continue reading


@schneier.com | 2 years ago

Linux-Targeted Malware Increased by 35%

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Piglet Squid

Continue reading


@schneier.com | 2 years ago

China’s Olympics App Is Horribly Insecure

Continue reading


@schneier.com | 2 years ago

San Francisco Police Illegally Spying on Protesters

Continue reading


@schneier.com | 2 years ago

Are Fake COVID Testing Sites Harvesting Data?

Continue reading


@schneier.com | 2 years ago

UK Government to Launch PR Campaign Undermining End-to-End Encryption

Continue reading


@schneier.com | 2 years ago

An Examination of the Bug Bounty Marketplace

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: The Evolution of Squid Eyes

Continue reading


@schneier.com | 2 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 2 years ago

Using EM Waves to Detect Malware

Continue reading


@schneier.com | 2 years ago

Using Foreign Nationals to Bypass US Surveillance Restrictions

Continue reading


@schneier.com | 2 years ago

Faking an iPhone Reboot

Continue reading


@schneier.com | 2 years ago

Apple’s Private Relay Is Being Blocked

Continue reading


@schneier.com | 2 years ago

Fake QR Codes on Parking Meters

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Squid Prices Are Rising

Continue reading


@schneier.com | 2 years ago

Norton’s Antivirus Product Now Includes an Ethereum Miner

Continue reading


@schneier.com | 2 years ago

People Are Increasingly Choosing Private Web Search

Continue reading


@schneier.com | 2 years ago

More Russian Cyber Operations against Ukraine

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Deep-Dwelling Squid

Continue reading


@schneier.com | 2 years ago

Apple AirTags Are Being Used to Track People and Cars

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: Squid-Headed Statue Appears in Dallas

Continue reading


@schneier.com | 2 years ago

Stolen Bitcoins Returned

Continue reading


@schneier.com | 2 years ago

More on NSO Group and Cytrox: Two Cyberweapons Arms Manufacturers

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: UK Recognizes Squid as Sentient Beings

Continue reading


@schneier.com | 2 years ago

More Log4j News

Continue reading


@schneier.com | 2 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 2 years ago

On the Log4j Vulnerability

Continue reading


@schneier.com | 2 years ago

NSO Group’s Pegasus Spyware Used Against US State Department Officials

Continue reading


@schneier.com | 2 years ago

Friday Squid Blogging: The Far Side Squid Comic

Continue reading


@schneier.com | 2 years ago

Law Enforcement Access to Chat Data and Metadata

Continue reading


@schneier.com | 2 years ago

Google Shuts Down Glupteba Botnet, Sues Operators

Continue reading


@schneier.com | 2 years ago

New German Government is Pro-Encryption and Anti-Backdoors

Continue reading


@schneier.com | 2 years ago

Someone Is Running Lots of Tor Relays

Continue reading


@schneier.com | 2 years ago

Thieves Using AirTags to “Follow” Cars

Continue reading


@schneier.com | 2 years ago