How the FIN7 Cybercrime Gang Operates

Continue reading


@schneier.com | 4 years ago

Privacy Analysis of Ambient Light Sensors

Continue reading


@schneier.com | 4 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 4 years ago

Interesting Attack on the EMV Smartcard Payment Standard

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Calamari vs. Squid

Continue reading


@schneier.com | 4 years ago

Ranking National Cyber Power

Continue reading


@schneier.com | 4 years ago

The Third Edition of Ross Anderson’s Security Engineering

Continue reading


@schneier.com | 4 years ago

US Space Cybersecurity Directive

Continue reading


@schneier.com | 4 years ago

More on NIST's Post-Quantum Cryptography

Continue reading


@schneier.com | 4 years ago

Schneier.com is Moving

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Morning Squid

Continue reading


@schneier.com | 4 years ago

Hacking AI-Graded Tests

Continue reading


@schneier.com | 4 years ago

2017 Tesla Hack

Continue reading


@schneier.com | 4 years ago

Insider Attack on the Carnegie Library

Continue reading


@schneier.com | 4 years ago

North Korea ATM Hack

Continue reading


@schneier.com | 4 years ago

Seny Kamara on "Crypto for the People"

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters

Continue reading


@schneier.com | 4 years ago

US Postal Service Files Blockchain Voting Patent

Continue reading


@schneier.com | 4 years ago

Cory Doctorow on The Age of Surveillance Capitalism

Continue reading


@schneier.com | 4 years ago

Amazon Supplier Fraud

Continue reading


@schneier.com | 4 years ago

Identifying People by Their Browsing Histories

Continue reading


@schneier.com | 4 years ago

DiceKeys

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Rhode Island's State Appetizer Is Calamari

Continue reading


@schneier.com | 4 years ago

Yet Another Biometric: Bioacoustic Signatures

Continue reading


@schneier.com | 4 years ago

Copying a Key by Listening to It in Action

Continue reading


@schneier.com | 4 years ago

Using Disinformation to Cause a Blackout

Continue reading


@schneier.com | 4 years ago

Vaccine for Emotet Malware

Continue reading


@schneier.com | 4 years ago

Robocall Results from a Telephony Honeypot

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Editing the Squid Genome

Continue reading


@schneier.com | 4 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 4 years ago

Drovorub Malware

Continue reading


@schneier.com | 4 years ago

UAE Hack and Leak Operations

Continue reading


@schneier.com | 4 years ago

Cryptanalysis of an Old Zip Encryption Algorithm

Continue reading


@schneier.com | 4 years ago

Collecting and Selling Mobile Phone Location Data

Continue reading


@schneier.com | 4 years ago

Smart Lock Vulnerability

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: New SQUID

Continue reading


@schneier.com | 4 years ago

The NSA on the Risks of Exposing Location Data

Continue reading


@schneier.com | 4 years ago

Cybercrime in the Age of COVID-19

Continue reading


@schneier.com | 4 years ago

BlackBerry Phone Cracked

Continue reading


@schneier.com | 4 years ago

Twitter Hacker Arrested

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Squid Proteins for a Better Face Mask

Continue reading


@schneier.com | 4 years ago

Data and Goliath Book Placement

Continue reading


@schneier.com | 4 years ago

Fake Stories in Real News Sites

Continue reading


@schneier.com | 4 years ago

Survey of Supply Chain Attacks

Continue reading


@schneier.com | 4 years ago

Images in Eye Reflections

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Introducing the Seattle Kraken

Continue reading


@schneier.com | 4 years ago

Update on NIST's Post-Quantum Cryptography Program

Continue reading


@schneier.com | 4 years ago

Minimal Key Lengths for Symmetric Ciphers (1996) [pdf]

Continue reading


@schneier.com | 4 years ago