China's Hacking of the Border Gateway Protocol – Schneier on Security

Continue reading


@schneier.com | 5 years ago

Security in a World of Physically Capable Computers

Continue reading


@schneier.com | 5 years ago

New Variants of Cold-Boot Attack

Continue reading


@schneier.com | 5 years ago

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Continue reading


@schneier.com | 5 years ago

Bruce Schneier: Quantum Computing and Cryptography

Continue reading


@schneier.com | 5 years ago

Security Vulnerability in Smart Electric Outlets

Continue reading


@schneier.com | 5 years ago

BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid

Continue reading


@schneier.com | 5 years ago

Data Is a Toxic Asset, So Why Not Throw It Out? (2016)

Continue reading


@schneier.com | 5 years ago

DNSSEC Root Key Split Among Seven People (2010)

Continue reading


@schneier.com | 5 years ago

Don't Fear the TSA Cutting Airport Security. Be Glad They're Talking about It

Continue reading


@schneier.com | 5 years ago

SpiderOak's Warrant Canary Died

Continue reading


@schneier.com | 5 years ago

Department of Commerce Report on the Botnet Threat – Schneier on Security

Continue reading


@schneier.com | 5 years ago

California Passes New Privacy Law

Continue reading


@schneier.com | 5 years ago

Terrorists, Data Mining, and the Base Rate Fallacy

Continue reading


@schneier.com | 5 years ago

Solitaire cryptosystem

Continue reading


@schneier.com | 5 years ago

Free Societies Are at a Disadvantage in National Cybersecurity

Continue reading


@schneier.com | 5 years ago

Russian Censorship of Telegram

Continue reading


@schneier.com | 5 years ago

New iPhone OS May Include Device-Unlocking Security

Continue reading


@schneier.com | 5 years ago

New Data Privacy Regulations

Continue reading


@schneier.com | 5 years ago

Detecting Lies Through Mouse Movements

Continue reading


@schneier.com | 5 years ago

Maliciously Changing Someone's Address – Schneier on Security

Continue reading


@schneier.com | 5 years ago

Schneier: Details on a New PGP Vulnerability

Continue reading


@schneier.com | 5 years ago

Sending Inaudible Commands to Voice Assistants

Continue reading


@schneier.com | 5 years ago

The Solitaire Encryption Algorithm (1999)

Continue reading


@schneier.com | 6 years ago

NIST Issues Call for “Lightweight Cryptography” Algorithms

Continue reading


@schneier.com | 6 years ago

Two NSA Algorithms Rejected by the ISO

Continue reading


@schneier.com | 6 years ago

Security Vulnerabilities in VingCard Electronic Locks

Continue reading


@schneier.com | 6 years ago

The NSA is not made of magic

Continue reading


@schneier.com | 6 years ago