Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 388 followers

Latest posts

Last updated about 2 hours ago

Friday Squid Blogging: Bobtail Squid

about 2 hours ago

Nice short article on the bobtail squid As usual, you can also...

I’m Spending the Year at the Munk School

about 4 hours ago

This academic year, I am taking a sabbatical from the Kennedy School...

AI Agents Need Data Integrity

about 12 hours ago

Think of the Web as a digital territory with its own social...

Jim Sanborn Is Auctioning Off the Solution to Part Four of the Kryptos Sculpture

1 day ago

Well, this is interesting The auction, which will include other items related...

Subverting AIOps Systems Through Poisoned Input Data

3 days ago

In this input integrity attack against an AI system, researchers were able...

Zero-Day Exploit in WinRAR File

4 days ago

A zero-day vulnerability in WinRAR is being exploited by at least two...

Eavesdropping on Phone Conversations Through Vibrations

5 days ago

Researchers have managed to eavesdrop on cell phone voice conversations by using...

Friday Squid Blogging: Squid-Shaped UFO Spotted Over Texas

7 days ago

Here’s the story. The commenters on X (formerly Twitter) are unimpressed As...

Trojans Embedded in .svg Files

8 days ago

Porn sites are hiding code in .svg files Unpacking the attack took...

LLM Coding Integrity Breach

9 days ago

Here’s an interesting story about a failure being introduced by LLM-written code...

AI Applications in Cybersecurity

9 days ago

There is a really great series of online events highlighting cool uses...

SIGINT During World War II

10 days ago

The NSA and GCHQ have jointly published a history of World War...