Cybersecurity for the Public Interest

Continue reading


@schneier.com | 5 years ago

Why Isn't GDPR Being Enforced?

Continue reading


@schneier.com | 5 years ago

On Security Tokens

Continue reading


@schneier.com | 5 years ago

Defending Democracies Against Information Attacks

Continue reading


@schneier.com | 5 years ago

Stealing Ethereum by Guessing Weak Private Keys

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Toraiz SQUID Digital Sequencer

Continue reading


@schneier.com | 5 years ago

Interview of Me in Taiwan

Continue reading


@schneier.com | 5 years ago

Towards an Information Operations Kill Chain

Continue reading


@schneier.com | 5 years ago

Fooling Automated Surveillance Cameras with Patchwork Color Printout

Continue reading


@schneier.com | 5 years ago

Vulnerability in French Government Tchap Chat App

Continue reading


@schneier.com | 5 years ago

G7 Comes Out in Favor of Encryption Backdoors

Continue reading


@schneier.com | 5 years ago

Excellent Analysis of the Boeing 737 MAX Software Problems

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: New Squid Species off the New Zealand Coast

Continue reading


@schneier.com | 5 years ago

Iranian Cyber-Espionage Tools Leaked Online

Continue reading


@schneier.com | 5 years ago

New DNS Hijacking Attacks

Continue reading


@schneier.com | 5 years ago

A "Department of Cybersecurity"

Continue reading


@schneier.com | 5 years ago

More on the Triton Malware

Continue reading


@schneier.com | 5 years ago

Vulnerabilities in the WPA3 Wi-Fi Security Protocol

Continue reading


@schneier.com | 5 years ago

China Spying on Undersea Internet Cables

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Detecting Illegal Squid Fishing with Satellite Imagery

Continue reading


@schneier.com | 5 years ago

Maliciously Tampering with Medical Imagery

Continue reading


@schneier.com | 5 years ago

New Version of Flame Malware Discovered

Continue reading


@schneier.com | 5 years ago

TajMahal Spyware

Continue reading


@schneier.com | 5 years ago

IT Security and the Normalization of Deviance (2016)

Continue reading


@schneier.com | 5 years ago

How the Anonymous Artist Bansky Authenticates His or Her Work

Continue reading


@schneier.com | 5 years ago

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers

Continue reading


@schneier.com | 5 years ago

Ghidra: NSA's Reverse-Engineering Tool

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Fried Squid Recipe

Continue reading


@schneier.com | 5 years ago

Unhackable Cryptography?

Continue reading


@schneier.com | 5 years ago

Former Mozilla CTO Harassed at the US Border

Continue reading


@schneier.com | 5 years ago

Adversarial Machine Learning against Tesla's Autopilot

Continue reading


@schneier.com | 5 years ago

How Political Campaigns Use Personal Data

Continue reading


@schneier.com | 5 years ago

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews

Continue reading


@schneier.com | 5 years ago

Recovering Smartphone Typing from Microphone Sounds

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

Continue reading


@schneier.com | 5 years ago

NSA-Inspired Vulnerability Found in Huawei Laptops

Continue reading


@schneier.com | 5 years ago

Malware Installed in Asus Computers Through Hacked Update Process

Continue reading


@schneier.com | 5 years ago

Programmers Who Don't Understand Security Are Poor at Security

Continue reading


@schneier.com | 5 years ago

Personal Data Left on Used Laptops

Continue reading


@schneier.com | 5 years ago

Mail Fishing

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: New Research on Squid Camouflage

Continue reading


@schneier.com | 5 years ago

Enigma, Typex, and Bombe Simulators

Continue reading


@schneier.com | 5 years ago

First Look Media Shutting Down Access to Snowden NSA Archives

Continue reading


@schneier.com | 5 years ago

Zipcar Disruption

Continue reading


@schneier.com | 5 years ago

An Argument that Cybersecurity Is Basically Okay

Continue reading


@schneier.com | 5 years ago

Triton

Continue reading


@schneier.com | 5 years ago

CAs Reissue Over One Million Weak Certificates

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii

Continue reading


@schneier.com | 5 years ago