New Version of Flame Malware Discovered

Continue reading


@schneier.com | 5 years ago

TajMahal Spyware

Continue reading


@schneier.com | 5 years ago

IT Security and the Normalization of Deviance (2016)

Continue reading


@schneier.com | 5 years ago

How the Anonymous Artist Bansky Authenticates His or Her Work

Continue reading


@schneier.com | 5 years ago

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers

Continue reading


@schneier.com | 5 years ago

Ghidra: NSA's Reverse-Engineering Tool

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Fried Squid Recipe

Continue reading


@schneier.com | 5 years ago

Unhackable Cryptography?

Continue reading


@schneier.com | 5 years ago

Former Mozilla CTO Harassed at the US Border

Continue reading


@schneier.com | 5 years ago

Adversarial Machine Learning against Tesla's Autopilot

Continue reading


@schneier.com | 5 years ago

How Political Campaigns Use Personal Data

Continue reading


@schneier.com | 5 years ago

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews

Continue reading


@schneier.com | 5 years ago

Recovering Smartphone Typing from Microphone Sounds

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

Continue reading


@schneier.com | 5 years ago

NSA-Inspired Vulnerability Found in Huawei Laptops

Continue reading


@schneier.com | 5 years ago

Malware Installed in Asus Computers Through Hacked Update Process

Continue reading


@schneier.com | 5 years ago

Programmers Who Don't Understand Security Are Poor at Security

Continue reading


@schneier.com | 5 years ago

Personal Data Left on Used Laptops

Continue reading


@schneier.com | 5 years ago

Mail Fishing

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: New Research on Squid Camouflage

Continue reading


@schneier.com | 5 years ago

Enigma, Typex, and Bombe Simulators

Continue reading


@schneier.com | 5 years ago

First Look Media Shutting Down Access to Snowden NSA Archives

Continue reading


@schneier.com | 5 years ago

Zipcar Disruption

Continue reading


@schneier.com | 5 years ago

An Argument that Cybersecurity Is Basically Okay

Continue reading


@schneier.com | 5 years ago

Triton

Continue reading


@schneier.com | 5 years ago

CAs Reissue Over One Million Weak Certificates

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii

Continue reading


@schneier.com | 5 years ago

I Was Cited in a Court Decision

Continue reading


@schneier.com | 5 years ago

Upcoming Speaking Engagements

Continue reading


@schneier.com | 5 years ago

Critical Flaw in Swiss Internet Voting System

Continue reading


@schneier.com | 5 years ago

DARPA Is Developing an Open-Source Voting System

Continue reading


@schneier.com | 5 years ago

Judging Facebook's Privacy Shift

Continue reading


@schneier.com | 5 years ago

On Surveillance in the Workplace

Continue reading


@schneier.com | 5 years ago

Russia Is Testing Online Voting

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Squid Proteins Can Be an Alternative to Plastic

Continue reading


@schneier.com | 5 years ago

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Continue reading


@schneier.com | 5 years ago

Cybersecurity Insurance Not Paying for NotPetya Losses

Continue reading


@schneier.com | 5 years ago

Detecting Shoplifting Behavior

Continue reading


@schneier.com | 5 years ago

Letterlocking

Continue reading


@schneier.com | 5 years ago

Digital Signatures in PDFs Are Broken

Continue reading


@schneier.com | 5 years ago

Cybersecurity for the Public Interest

Continue reading


@schneier.com | 5 years ago

The Latest in Creepy Spyware

Continue reading


@schneier.com | 5 years ago

Friday Squid Blogging: Chinese Squid-Processing Facility

Continue reading


@schneier.com | 5 years ago

Using Gmail “Dot Addresses” to Commit Fraud

Continue reading


@schneier.com | 5 years ago

Security Flaws in Children's Smart Watches

Continue reading


@schneier.com | 5 years ago

Military Carrier Pigeons in the Era of Electronic Warfare

Continue reading


@schneier.com | 5 years ago

Evaluating the GCHQ Exceptional Access Proposal

Continue reading


@schneier.com | 5 years ago

Schneier on the effectiveness of modern security

Continue reading


@schneier.com | 5 years ago