FBI/AFP-Run Encrypted Phone

Continue reading


@schneier.com | 3 years ago

Detecting Deepfake Picture Editing

Continue reading


@schneier.com | 3 years ago

Information Flows and Democracy

Continue reading


@schneier.com | 3 years ago

Vulnerabilities in Weapons Systems

Continue reading


@schneier.com | 3 years ago

The Supreme Court Narrowed the CFAA

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squids in Space

Continue reading


@schneier.com | 3 years ago

Security and Human Behavior (SHB) 2021

Continue reading


@schneier.com | 3 years ago

The DarkSide Ransomware Gang

Continue reading


@schneier.com | 3 years ago

Security Vulnerability in Apple’s Silicon “M1” Chip

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Underwater Cameras for Observing Squid

Continue reading


@schneier.com | 3 years ago

The Misaligned Incentives for Cloud Security

Continue reading


@schneier.com | 3 years ago

The Story of the 2011 RSA Hack

Continue reading


@schneier.com | 3 years ago

New Disk Wiping Malware Targets Israel

Continue reading


@schneier.com | 3 years ago

AIs and Fake Comments

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Picking up Squid on the Beach

Continue reading


@schneier.com | 3 years ago

Double-Encrypting Ransomware

Continue reading


@schneier.com | 3 years ago

Bizarro Banking Trojan

Continue reading


@schneier.com | 3 years ago

Apple Censorship and Surveillance in China

Continue reading


@schneier.com | 3 years ago

Adding a Russian Keyboard to Protect against Ransomware

Continue reading


@schneier.com | 3 years ago

Is 85% of US Critical Infrastructure in Private Hands?

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Far Side Squid Comic

Continue reading


@schneier.com | 3 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 3 years ago

Ransomware Is Getting Ugly

Continue reading


@schneier.com | 3 years ago

New US Executive Order on Cybersecurity

Continue reading


@schneier.com | 3 years ago

Book Sale: Beyond Fear

Continue reading


@schneier.com | 3 years ago

AI Security Risk Assessment Tool

Continue reading


@schneier.com | 3 years ago

Ransomware Shuts Down US Pipeline

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: COVID Relief Funds

Continue reading


@schneier.com | 3 years ago

Teaching Cybersecurity to Children

Continue reading


@schneier.com | 3 years ago

The Story of Colossus

Continue reading


@schneier.com | 3 years ago

New Spectre-Like Attacks

Continue reading


@schneier.com | 3 years ago

Tesla Remotely Hacked from a Drone

Continue reading


@schneier.com | 3 years ago

Identifying the Person Behind Bitcoin Fog

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: On Squid Coloration

Continue reading


@schneier.com | 3 years ago

Serious MacOS Vulnerability Patched

Continue reading


@schneier.com | 3 years ago

Identifying People Through Lack of Cell Phone Use

Continue reading


@schneier.com | 3 years ago

Second Click Here to Kill Everybody Sale

Continue reading


@schneier.com | 3 years ago

Security Vulnerabilities in Cellebrite

Continue reading


@schneier.com | 3 years ago

When AIs Start Hacking

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squid-Shaped Bike Rack

Continue reading


@schneier.com | 3 years ago

On North Korea’s Cyberattack Capabilities

Continue reading


@schneier.com | 3 years ago

Backdoor Found in Codecov Bash Uploader

Continue reading


@schneier.com | 3 years ago

Biden Administration Imposes Sanctions on Russia for SolarWinds

Continue reading


@schneier.com | 3 years ago

Details on the Unlocking of the San Bernardino Terrorist’s iPhone

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Blobs of Squid Eggs Found Near Norway

Continue reading


@schneier.com | 3 years ago

Cybersecurity Experts to Follow on Twitter

Continue reading


@schneier.com | 3 years ago

NSA Discloses Vulnerabilities in Microsoft Exchange

Continue reading


@schneier.com | 3 years ago

DNI’s Annual Threat Assessment

Continue reading


@schneier.com | 3 years ago