Upcoming Speaking Engagements

Continue reading


@schneier.com | 3 years ago

The FBI Is Now Securing Networks Without Their Owners’ Permission

Continue reading


@schneier.com | 3 years ago

More Biden Cybersecurity Nominations

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Jurassic Squid and Prey

Continue reading


@schneier.com | 3 years ago

Backdoor Added — But Found — in PHP

Continue reading


@schneier.com | 3 years ago

Google’s Project Zero Finds a Nation-State Zero-Day Operation

Continue reading


@schneier.com | 3 years ago

Signal Adds Cryptocurrency Support

Continue reading


@schneier.com | 3 years ago

Phone Cloning Scam

Continue reading


@schneier.com | 3 years ago

Wi-Fi Devices as Physical Object Sensors

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: 500-Million-Year-Old Cephalopod

Continue reading


@schneier.com | 3 years ago

Malware Hidden in Call of Duty Cheating Software

Continue reading


@schneier.com | 3 years ago

Fugitive Identified on YouTube By His Distinctive Tattoos

Continue reading


@schneier.com | 3 years ago

System Update: New Android Malware

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squid Potato Masher

Continue reading


@schneier.com | 3 years ago

Hacking Weapons Systems

Continue reading


@schneier.com | 3 years ago

Determining Key Shape from Sound

Continue reading


@schneier.com | 3 years ago

Accellion Supply Chain Hack

Continue reading


@schneier.com | 3 years ago

Details of a Computer Banking Scam

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squid Cartoon

Continue reading


@schneier.com | 3 years ago

Easy SMS Hijacking

Continue reading


@schneier.com | 3 years ago

Exploiting Spectre Over the Internet

Continue reading


@schneier.com | 3 years ago

Illegal Content and the Blockchain

Continue reading


@schneier.com | 3 years ago

On the Insecurity of ES&S Voting Machines’ Hash Code

Continue reading


@schneier.com | 3 years ago

“Schneier's Law”

Continue reading


@schneier.com | 3 years ago

Security Analysis of Apple’s “Find My ” Protocol

Continue reading


@schneier.com | 3 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: On SQUIDS

Continue reading


@schneier.com | 3 years ago

Metadata Left in Security Agency PDFs

Continue reading


@schneier.com | 3 years ago

Fast Random Bit Generation

Continue reading


@schneier.com | 3 years ago

More on the Chinese Zero-Day Microsoft Exchange Hack

Continue reading


@schneier.com | 3 years ago

On Not Fixing Old Vulnerabilities

Continue reading


@schneier.com | 3 years ago

Hacking Digitally Signed PDF Files

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Vampire Squid Fossil

Continue reading


@schneier.com | 3 years ago

No, RSA Is Not Broken

Continue reading


@schneier.com | 3 years ago

Threat Model Humor

Continue reading


@schneier.com | 3 years ago

Four Microsoft Exchange Zero-Days Exploited by China

Continue reading


@schneier.com | 3 years ago

Chinese Hackers Stole an NSA Windows Exploit in 2014

Continue reading


@schneier.com | 3 years ago

Encoded Message in the Perseverance Mars Lander’s Parachute

Continue reading


@schneier.com | 3 years ago

Mysterious Macintosh Malware

Continue reading


@schneier.com | 3 years ago

National Security Risks of Late-Stage Capitalism

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Far Side Cartoon

Continue reading


@schneier.com | 3 years ago

The Problem with Treating Data as a Commodity

Continue reading


@schneier.com | 3 years ago

On Chinese-Owned Technology Platforms

Continue reading


@schneier.com | 3 years ago

Twelve-Year-Old Vulnerability Found in Windows Defender

Continue reading


@schneier.com | 3 years ago

Dependency Confusion: Another Supply-Chain Vulnerability

Continue reading


@schneier.com | 3 years ago

GPS Vulnerabilities

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Amazing Video of a Black-Eyed Squid Trying to Eat an Owlfish

Continue reading


@schneier.com | 3 years ago

Router Security

Continue reading


@schneier.com | 3 years ago