Facebook Is Down

Continue reading


@schneier.com | 3 years ago

Cheating on Tests

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squid Game

Continue reading


@schneier.com | 3 years ago

A Death Due to Ransomware

Continue reading


@schneier.com | 3 years ago

Hardening Your VPN

Continue reading


@schneier.com | 3 years ago

Check What Information Your Browser Leaks

Continue reading


@schneier.com | 3 years ago

Tracking Stolen Cryptocurrencies

Continue reading


@schneier.com | 3 years ago

Did NSA Put a Secret Backdoor in the Encryption Standard?

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Person in Squid Suit Takes Dog for a Walk

Continue reading


@schneier.com | 3 years ago

I Am Not Satoshi Nakamoto

Continue reading


@schneier.com | 3 years ago

The Proliferation of Zero-days

Continue reading


@schneier.com | 3 years ago

ROT8000

Continue reading


@schneier.com | 3 years ago

FBI Had the REvil Decryption Key

Continue reading


@schneier.com | 3 years ago

Alaska’s Department of Health and Social Services Hack

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Ram’s Horn Squid Shells

Continue reading


@schneier.com | 3 years ago

Zero-Click iMessage Exploit

Continue reading


@schneier.com | 3 years ago

Identifying Computer-Generated Faces

Continue reading


@schneier.com | 3 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 3 years ago

Designing Contact-Tracing Apps

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Possible Evidence of Squid Paternal Care

Continue reading


@schneier.com | 3 years ago

ProtonMail Now Keeps IP Logs

Continue reading


@schneier.com | 3 years ago

More Detail on the Juniper Hack and the NSA PRNG Backdoor

Continue reading


@schneier.com | 3 years ago

Security Risks of Relying on a Single Smartphone

Continue reading


@schneier.com | 3 years ago

Lightning Cable with Embedded Eavesdropping

Continue reading


@schneier.com | 3 years ago

Tracking People by their MAC Addresses

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squid Communication

Continue reading


@schneier.com | 3 years ago

Hacker-Themed Board Game

Continue reading


@schneier.com | 3 years ago

History of the HX-63 Rotor Machine

Continue reading


@schneier.com | 3 years ago

Zero-Click iPhone Exploits

Continue reading


@schneier.com | 3 years ago

More Military Cryptanalytics, Part III

Continue reading


@schneier.com | 3 years ago

Excellent Write-up of the SolarWinds Security Breach

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Tentacle Doorknob

Continue reading


@schneier.com | 3 years ago

Details of the Recent T-Mobile Breach

Continue reading


@schneier.com | 3 years ago

Interesting Privilege Escalation Vulnerability

Continue reading


@schneier.com | 3 years ago

Surveillance of the Internet Backbone

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: On Squid Brains

Continue reading


@schneier.com | 3 years ago

More on Apple’s iPhone Backdoor

Continue reading


@schneier.com | 3 years ago

T-Mobile Data Breach

Continue reading


@schneier.com | 3 years ago

Apple's NeuralHash Algorithm Has Been Reverse-Engineered

Continue reading


@schneier.com | 3 years ago

Tetris: Chinese Espionage Tool

Continue reading


@schneier.com | 3 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: A Good Year for Squid?

Continue reading


@schneier.com | 3 years ago

Using AI to Scale Spear Phishing

Continue reading


@schneier.com | 3 years ago

Cobolt Strike Vulnerability Affects Botnet Servers

Continue reading


@schneier.com | 3 years ago

Apple Adds a Backdoor to iMesssage and iCloud Storage

Continue reading


@schneier.com | 3 years ago

Defeating Microsoft’s Trusted Platform Module

Continue reading


@schneier.com | 3 years ago

Squid Dog Toy

Continue reading


@schneier.com | 3 years ago

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems

Continue reading


@schneier.com | 3 years ago