I Was Cited in a Court Decision

Continue reading


@schneier.com | 5 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 5 years ago

Critical Flaw in Swiss Internet Voting System

Continue reading


@schneier.com | 5 years ago

DARPA Is Developing an Open-Source Voting System

Continue reading


@schneier.com | 5 years ago

Judging Facebook's Privacy Shift

Continue reading


@schneier.com | 5 years ago

On Surveillance in the Workplace

Continue reading


@schneier.com | 5 years ago

Russia Is Testing Online Voting

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Squid Proteins Can Be an Alternative to Plastic

Continue reading


@schneier.com | 5 years ago

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Continue reading


@schneier.com | 5 years ago

Cybersecurity Insurance Not Paying for NotPetya Losses

Continue reading


@schneier.com | 5 years ago

Detecting Shoplifting Behavior

Continue reading


@schneier.com | 5 years ago

Letterlocking

Continue reading


@schneier.com | 5 years ago

Digital Signatures in PDFs Are Broken

Continue reading


@schneier.com | 5 years ago

Cybersecurity for the Public Interest

Continue reading


@schneier.com | 5 years ago

The Latest in Creepy Spyware

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Chinese Squid-Processing Facility

Continue reading


@schneier.com | 5 years ago

Using Gmail “Dot Addresses” to Commit Fraud

Continue reading


@schneier.com | 5 years ago

Security Flaws in Children's Smart Watches

Continue reading


@schneier.com | 5 years ago

Military Carrier Pigeons in the Era of Electronic Warfare

Continue reading


@schneier.com | 5 years ago

Evaluating the GCHQ Exceptional Access Proposal

Continue reading


@schneier.com | 5 years ago

Schneier on the effectiveness of modern security

Continue reading


@schneier.com | 5 years ago

Alex Stamos on Content Moderation and Security

Continue reading


@schneier.com | 5 years ago

New Attack Against Electrum Bitcoin Wallets

Continue reading


@schneier.com | 5 years ago

Machine Learning to Detect Software Vulnerabilities

Continue reading


@schneier.com | 5 years ago

Keys Under Doormats: mandating insecurity by requiring gov access to data [pdf]

Continue reading


@schneier.com | 5 years ago

Propaganda and the Weakening of Trust in Government

Continue reading


@schneier.com | 5 years ago

How Surveillance Inhibits Freedom of Expression

Continue reading


@schneier.com | 5 years ago

Information Attacks against Democracies

Continue reading


@schneier.com | 6 years ago

Principles for a TLA-Resistant, Email Service in Wake of Lavabit (2013)

Continue reading


@schneier.com | 6 years ago

New IoT Security Regulations

Continue reading


@schneier.com | 6 years ago

Security Vulnerability in Internet-Connected Construction Cranes

Continue reading


@schneier.com | 6 years ago

China's Hacking of the Border Gateway Protocol

Continue reading


@schneier.com | 6 years ago

China's Hacking of the Border Gateway Protocol – Schneier on Security

Continue reading


@schneier.com | 6 years ago

Security in a World of Physically Capable Computers

Continue reading


@schneier.com | 6 years ago

New Variants of Cold-Boot Attack

Continue reading


@schneier.com | 6 years ago

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Continue reading


@schneier.com | 6 years ago

Bruce Schneier: Quantum Computing and Cryptography

Continue reading


@schneier.com | 6 years ago

Security Vulnerability in Smart Electric Outlets

Continue reading


@schneier.com | 6 years ago

BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid

Continue reading


@schneier.com | 6 years ago

Data Is a Toxic Asset, So Why Not Throw It Out? (2016)

Continue reading


@schneier.com | 6 years ago

DNSSEC Root Key Split Among Seven People (2010)

Continue reading


@schneier.com | 6 years ago

Don't Fear the TSA Cutting Airport Security. Be Glad They're Talking about It

Continue reading


@schneier.com | 6 years ago

SpiderOak's Warrant Canary Died

Continue reading


@schneier.com | 6 years ago

Department of Commerce Report on the Botnet Threat – Schneier on Security

Continue reading


@schneier.com | 6 years ago

California Passes New Privacy Law

Continue reading


@schneier.com | 6 years ago

Terrorists, Data Mining, and the Base Rate Fallacy

Continue reading


@schneier.com | 6 years ago

Solitaire cryptosystem

Continue reading


@schneier.com | 6 years ago

Free Societies Are at a Disadvantage in National Cybersecurity

Continue reading


@schneier.com | 6 years ago