Friday Squid Blogging: New Species of Bobtail Squid

Continue reading


@schneier.com | 4 years ago

Chinese Hackers Bypassing Two-Factor Authentication

Continue reading


@schneier.com | 4 years ago

ToTok Is an Emirati Spying Tool

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Streamlined Quick Unfolding Investigation Drone

Continue reading


@schneier.com | 4 years ago

Lousy IoT Security

Continue reading


@schneier.com | 4 years ago

Attacker Causes Epileptic Seizure Over the Internet

Continue reading


@schneier.com | 4 years ago

Iranian Attacks on Industrial Control Systems

Continue reading


@schneier.com | 4 years ago

Security Vulnerabilities in the RCS Texting Protocol

Continue reading


@schneier.com | 4 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Color-Changing Properties of the Opalescent Inshore Squid

Continue reading


@schneier.com | 4 years ago

EFF on the Mechanics of Corporate Surveillance

Continue reading


@schneier.com | 4 years ago

Scaring People into Supporting Backdoors

Continue reading


@schneier.com | 4 years ago

Extracting Data from Smartphones

Continue reading


@schneier.com | 4 years ago

Reforming CDA 230

Continue reading


@schneier.com | 4 years ago

Failure Modes in Machine Learning

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Squidfall Safety

Continue reading


@schneier.com | 4 years ago

Andy Ellis on Risk Assessment

Continue reading


@schneier.com | 4 years ago

Election Machine Insecurity Story

Continue reading


@schneier.com | 4 years ago

Becoming a Tech Policy Activist

Continue reading


@schneier.com | 4 years ago

RSA-240 Factored

Continue reading


@schneier.com | 4 years ago

The Story of Tiversa

Continue reading


@schneier.com | 4 years ago

Cameras that Automatically Detect Mobile Phone Use

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Squid-Like Underwater Drone

Continue reading


@schneier.com | 4 years ago

Manipulating Machine Learning Systems by Manipulating Training Data

Continue reading


@schneier.com | 4 years ago

DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy

Continue reading


@schneier.com | 4 years ago

Data Is a Toxic Asset (2016)

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: T-Shirt

Continue reading


@schneier.com | 5 years ago

The NSA Warns of TLS Inspection

Continue reading


@schneier.com | 5 years ago

GPS Manipulation

Continue reading


@schneier.com | 5 years ago

Iran Has Shut Off the Internet

Continue reading


@schneier.com | 5 years ago

Security Vulnerabilities in Android Firmware

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Planctotuethis Squid

Continue reading


@schneier.com | 5 years ago

TPM-Fail Attacks Against Cryptographic Coprocessors

Continue reading


@schneier.com | 5 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 5 years ago

Technology and Policymakers

Continue reading


@schneier.com | 5 years ago

NTSB Investigation of Fatal Driverless Car Accident

Continue reading


@schneier.com | 5 years ago

Identifying and Arresting Ransomware Criminals

Continue reading


@schneier.com | 5 years ago

Fooling Voice Assistants with Lasers

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: 80-Foot Steel Kraken Deliberately Sunk

Continue reading


@schneier.com | 5 years ago

XHelper Malware for Android

Continue reading


@schneier.com | 5 years ago

xHelper Malware for Android

Continue reading


@schneier.com | 5 years ago

Eavesdropping on SMS Messages inside Telco Networks

Continue reading


@schneier.com | 5 years ago

Details of an Airbnb Fraud

Continue reading


@schneier.com | 5 years ago

Obfuscation as a Privacy Tool

Continue reading


@schneier.com | 5 years ago

Homemade TEMPEST Receiver

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Triassic Kraken

Continue reading


@schneier.com | 5 years ago

Resources for Measuring Cybersecurity

Continue reading


@schneier.com | 5 years ago

A Broken Random Number Generator in AMD Microcode

Continue reading


@schneier.com | 5 years ago