WhatsApp Sues NSO Group

Continue reading


@schneier.com | 5 years ago

ICT Supply-Chain Security

Continue reading


@schneier.com | 5 years ago

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots

Continue reading


@schneier.com | 5 years ago

Dark Web Site Taken Down without Breaking Encryption

Continue reading


@schneier.com | 5 years ago

The Eternal Value of Privacy

Continue reading


@schneier.com | 5 years ago

Mapping Security and Privacy Research across the Decades

Continue reading


@schneier.com | 5 years ago

NordVPN Breached

Continue reading


@schneier.com | 5 years ago

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance

Continue reading


@schneier.com | 5 years ago

Calculating the Benefits of the Advanced Encryption Standard

Continue reading


@schneier.com | 5 years ago

Details of the Olympic Destroyer APT

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef

Continue reading


@schneier.com | 5 years ago

Why Technologists Need to Get Involved in Public Policy

Continue reading


@schneier.com | 5 years ago

Adding a Hardware Backdoor to a Networked Computer

Continue reading


@schneier.com | 5 years ago

Dylan: A New Language Is Blowin' in the Wind (1992)

Continue reading


@schneier.com | 5 years ago

Using Machine Learning to Detect IP Hijacking

Continue reading


@schneier.com | 5 years ago

Cracking the Passwords of Early Internet Pioneers

Continue reading


@schneier.com | 5 years ago

Factoring 2048-bit Numbers Using 20 Million Qubits

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Apple Fixes Squid Emoji

Continue reading


@schneier.com | 5 years ago

I Have a New Book: We Have Root

Continue reading


@schneier.com | 5 years ago

Details on Uzbekistan Government Malware: SandCat

Continue reading


@schneier.com | 5 years ago

New Reductor Nation-State Malware Compromises TLS

Continue reading


@schneier.com | 5 years ago

Wi-Fi Hotspot Tracking

Continue reading


@schneier.com | 5 years ago

Cheating at Professional Poker

Continue reading


@schneier.com | 5 years ago

Illegal Data Center Hidden in Former NATO Bunker

Continue reading


@schneier.com | 5 years ago

Speakers Censored at AISA Conference in Melbourne

Continue reading


@schneier.com | 5 years ago

New Unpatchable iPhone Exploit Allows Jailbreaking

Continue reading


@schneier.com | 5 years ago

Edward Snowden's Memoirs

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Hawaiian Bobtail Squid Squirts Researcher

Continue reading


@schneier.com | 5 years ago

More Cryptanalysis of Solitaire

Continue reading


@schneier.com | 5 years ago

Tracking by Smart TVs

Continue reading


@schneier.com | 5 years ago

Measuring the Security of IoT Devices

Continue reading


@schneier.com | 5 years ago

New Research into Russian Malware

Continue reading


@schneier.com | 5 years ago

NSA on the Future of National Cybersecurity

Continue reading


@schneier.com | 5 years ago

Supply-Chain Security and Trust

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater Research Station?

Continue reading


@schneier.com | 5 years ago

Superhero Movies and Security Lessons

Continue reading


@schneier.com | 5 years ago

On Chinese "Spy Trains"

Continue reading


@schneier.com | 5 years ago

Ineffective Package Tracking Facilitates Fraud

Continue reading


@schneier.com | 5 years ago

Russians Hack FBI Comms System

Continue reading


@schneier.com | 5 years ago

France Outlines Its Approach to Cyberwar

Continue reading


@schneier.com | 5 years ago

Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago

Continue reading


@schneier.com | 5 years ago

A Feminist Take on Information Privacy

Continue reading


@schneier.com | 5 years ago

New Biometrics

Continue reading


@schneier.com | 5 years ago

Revisiting Software Vulnerabilities in the Boeing 787

Continue reading


@schneier.com | 5 years ago

I'm Looking to Hire a Strategist to Help Figure Out Public-Interest Tech

Continue reading


@schneier.com | 5 years ago

Cracking Forgotten Passwords

Continue reading


@schneier.com | 5 years ago

Another Side Channel in Intel Chips

Continue reading


@schneier.com | 5 years ago