Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 380 followers

Latest posts

Last updated about 10 hours ago

Measuring the Attack/Defense Balance

about 11 hours ago

“Who’s winning on the internet, the attackers or the defenders?” I’m asked...

Aeroflot Hacked

1 day ago

Looks serious.

That Time Tom Lehrer Pranked the NSA

2 days ago

Bluesky thread. Here’s the paper, from 1957. Note reference 3.

Microsoft SharePoint Zero-Day

2 days ago

Chinese hackers are exploiting a high-severity vulnerability in Microsoft SharePoint to steal...

Friday Squid Blogging: Stable Quasi-Isodynamic Designs

5 days ago

Yet another SQUID acronym: “Stable Quasi-Isodynamic Design.” It’s a stellarator for a...

Subliminal Learning in AIs

5 days ago

Today’s freaky LLM behavior We study subliminal learning, a surprising phenomenon where...

How Solid Protocol Restores Digital Agency

6 days ago

The current state of digital identity is a mess. Your personal information...

Google Sues the Badbox Botnet Operators

7 days ago

It will be interesting to watch what will come of this private...

“Encryption Backdoors and the Fourth Amendment”

8 days ago

Law journal article that looks at the Dual_EC_PRNG backdoor from a US...

Another Supply Chain Vulnerability

9 days ago

ProPublica is reporting Microsoft is using engineers in China to help maintain...

Friday Squid Blogging: The Giant Squid Nebula

12 days ago

Beautiful photo Difficult to capture, this mysterious, squid-shaped interstellar cloud spans nearly...

New Mobile Phone Forensics Tool

12 days ago

The Chinese have a new tool called Massistant Massistant is the presumed...