WEIS 2021 Call for Papers

Continue reading


@schneier.com | 3 years ago

Virginia Data Privacy Law

Continue reading


@schneier.com | 3 years ago

Browser Tracking Using Favicons

Continue reading


@schneier.com | 3 years ago

Malicious Barcode Scanner App

Continue reading


@schneier.com | 3 years ago

US Cyber Command Valentine’s Day Cryptography Puzzles

Continue reading


@schneier.com | 3 years ago

Deliberately Playing Copyrighted Music to Avoid Being Live-Streamed

Continue reading


@schneier.com | 3 years ago

On Vulnerability-Adjacent Vulnerabilities

Continue reading


@schneier.com | 3 years ago

Chinese Supply-Chain Attack on Computer Systems

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Flying Squid

Continue reading


@schneier.com | 3 years ago

Medieval Security Techniques

Continue reading


@schneier.com | 3 years ago

Attack against Florida Water Treatment Facility

Continue reading


@schneier.com | 3 years ago

Ransomware Profitability

Continue reading


@schneier.com | 3 years ago

Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer

Continue reading


@schneier.com | 3 years ago

SonicWall Zero-Day

Continue reading


@schneier.com | 3 years ago

NoxPlayer Android Emulator Supply-Chain Attack

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Live Giant Squid Found in Japan

Continue reading


@schneier.com | 3 years ago

Presidential Cybersecurity and Pelotons

Continue reading


@schneier.com | 3 years ago

Another SolarWinds Orion Hack

Continue reading


@schneier.com | 3 years ago

More SolarWinds News

Continue reading


@schneier.com | 3 years ago

Georgia’s Ballot-Marking Devices

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Squids Don’t Like Pile-Driving Noises

Continue reading


@schneier.com | 3 years ago

Including Hackers in NATO Wargames

Continue reading


@schneier.com | 3 years ago

New iMessage Security Features

Continue reading


@schneier.com | 3 years ago

Police Have Disrupted the Emotet Botnet

Continue reading


@schneier.com | 3 years ago

Dutch Insider Attack on COVID-19 Data

Continue reading


@schneier.com | 3 years ago

Massive Brazilian Data Breach

Continue reading


@schneier.com | 3 years ago

Insider Attack on Home Surveillance Systems

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Vegan Chili Squid

Continue reading


@schneier.com | 3 years ago

SVR Attacks on Microsoft 365

Continue reading


@schneier.com | 3 years ago

Sophisticated Watering Hole Attack

Continue reading


@schneier.com | 3 years ago

Injecting a Backdoor into SolarWinds Orion

Continue reading


@schneier.com | 3 years ago

Cell Phone Location Privacy

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: China Launches Six New Squid Jigging Vessels

Continue reading


@schneier.com | 3 years ago

Click Here to Kill Everybody Sale

Continue reading


@schneier.com | 3 years ago

Cell Phone Location Privacy

Continue reading


@schneier.com | 3 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 3 years ago

Finding the Location of Telegram Users

Continue reading


@schneier.com | 3 years ago

On US Capitol Security — By Someone Who Manages Arena-Rock-Concert Security

Continue reading


@schneier.com | 3 years ago

Cloning Google Titan 2FA keys

Continue reading


@schneier.com | 3 years ago

Changes in WhatsApp’s Privacy Policy

Continue reading


@schneier.com | 3 years ago

Friday Squid Blogging: Searching for Giant Squid by Collecting Environmental DNA

Continue reading


@schneier.com | 3 years ago

APT Horoscope

Continue reading


@schneier.com | 3 years ago

Russia’s SolarWinds Attack and Software Security

Continue reading


@schneier.com | 3 years ago

Extracting Personal Information from Large Language Models Like GPT-2

Continue reading


@schneier.com | 3 years ago

Backdoor in Zyxel Firewalls and Gateways

Continue reading


@schneier.com | 3 years ago

Latest on the SVR’s SolarWinds Hack

Continue reading


@schneier.com | 3 years ago

Military Cryptanalytics, Part III

Continue reading


@schneier.com | 3 years ago

Amazon Has Trucks Filled with Hard Drives and an Armed Guard

Continue reading


@schneier.com | 3 years ago