Security Vulnerabilities in Android Firmware

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Planctotuethis Squid

Continue reading


@schneier.com | 4 years ago

TPM-Fail Attacks Against Cryptographic Coprocessors

Continue reading


@schneier.com | 4 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 4 years ago

Technology and Policymakers

Continue reading


@schneier.com | 4 years ago

NTSB Investigation of Fatal Driverless Car Accident

Continue reading


@schneier.com | 4 years ago

Identifying and Arresting Ransomware Criminals

Continue reading


@schneier.com | 4 years ago

Fooling Voice Assistants with Lasers

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: 80-Foot Steel Kraken Deliberately Sunk

Continue reading


@schneier.com | 4 years ago

XHelper Malware for Android

Continue reading


@schneier.com | 4 years ago

xHelper Malware for Android

Continue reading


@schneier.com | 4 years ago

Eavesdropping on SMS Messages inside Telco Networks

Continue reading


@schneier.com | 4 years ago

Details of an Airbnb Fraud

Continue reading


@schneier.com | 4 years ago

Obfuscation as a Privacy Tool

Continue reading


@schneier.com | 4 years ago

Homemade TEMPEST Receiver

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Triassic Kraken

Continue reading


@schneier.com | 4 years ago

Resources for Measuring Cybersecurity

Continue reading


@schneier.com | 4 years ago

A Broken Random Number Generator in AMD Microcode

Continue reading


@schneier.com | 4 years ago

WhatsApp Sues NSO Group

Continue reading


@schneier.com | 4 years ago

ICT Supply-Chain Security

Continue reading


@schneier.com | 4 years ago

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots

Continue reading


@schneier.com | 4 years ago

Dark Web Site Taken Down without Breaking Encryption

Continue reading


@schneier.com | 4 years ago

The Eternal Value of Privacy

Continue reading


@schneier.com | 4 years ago

Mapping Security and Privacy Research across the Decades

Continue reading


@schneier.com | 4 years ago

NordVPN Breached

Continue reading


@schneier.com | 4 years ago

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance

Continue reading


@schneier.com | 4 years ago

Calculating the Benefits of the Advanced Encryption Standard

Continue reading


@schneier.com | 4 years ago

Details of the Olympic Destroyer APT

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef

Continue reading


@schneier.com | 4 years ago

Why Technologists Need to Get Involved in Public Policy

Continue reading


@schneier.com | 4 years ago

Adding a Hardware Backdoor to a Networked Computer

Continue reading


@schneier.com | 4 years ago

Dylan: A New Language Is Blowin' in the Wind (1992)

Continue reading


@schneier.com | 4 years ago

Using Machine Learning to Detect IP Hijacking

Continue reading


@schneier.com | 4 years ago

Cracking the Passwords of Early Internet Pioneers

Continue reading


@schneier.com | 4 years ago

Factoring 2048-bit Numbers Using 20 Million Qubits

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Apple Fixes Squid Emoji

Continue reading


@schneier.com | 4 years ago

I Have a New Book: We Have Root

Continue reading


@schneier.com | 4 years ago

Details on Uzbekistan Government Malware: SandCat

Continue reading


@schneier.com | 4 years ago

New Reductor Nation-State Malware Compromises TLS

Continue reading


@schneier.com | 4 years ago

Wi-Fi Hotspot Tracking

Continue reading


@schneier.com | 4 years ago

Cheating at Professional Poker

Continue reading


@schneier.com | 4 years ago

Illegal Data Center Hidden in Former NATO Bunker

Continue reading


@schneier.com | 4 years ago

Speakers Censored at AISA Conference in Melbourne

Continue reading


@schneier.com | 4 years ago

New Unpatchable iPhone Exploit Allows Jailbreaking

Continue reading


@schneier.com | 4 years ago

Edward Snowden's Memoirs

Continue reading


@schneier.com | 4 years ago

Friday Squid Blogging: Hawaiian Bobtail Squid Squirts Researcher

Continue reading


@schneier.com | 4 years ago

More Cryptanalysis of Solitaire

Continue reading


@schneier.com | 4 years ago