Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 389 followers

Latest posts

Last updated about 6 hours ago

Troy Hunt Gets Phished

about 6 hours ago

In case you need proof that anyone, even people who do cybersecurity...

Web 3.0 Requires Data Integrity

1 day ago

If you’ve ever taken a computer security class, you’ve probably learned about...

Rational Astrologies and Security

2 days ago

John Kelsey and I wrote a short paper for the Rossfest Festschrift...

Cell Phone OPSEC for Border Crossings

3 days ago

I have heard stories of more aggressive interrogation of electronic devices at...

The Signal Chat Leak and the NSA

4 days ago

US National Security Advisor Mike Waltz, who started the now-infamous group chat...

Friday Squid Blogging: Squid Werewolf Hacking Group

7 days ago

In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.”...

AIs as Trusted Third Parties

7 days ago

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private...

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

8 days ago

NIST just released a comprehensive taxonomy of adversarial machine learning attacks and...

AI Data Poisoning

9 days ago

Cloudflare has a new feature—available to free users as well—that uses AI...

Report on Paragon Spyware

10 days ago

Citizen Lab has a new report on Paragon’s spyware Key Findings: Introducing...

More Countries are Demanding Backdoors to Encrypted Apps

11 days ago

Last month, I wrote about the UK forcing Apple to break its...

Friday Squid Blogging: A New Explanation of Squid Camouflage

14 days ago

New research An associate professor of chemistry and chemical biology at Northeastern...