Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 2239 followers

Latest posts

Last updated 2 days ago

Friday Squid Blogging: The Giant Squid Nebula

2 days ago

Beautiful photo Difficult to capture, this mysterious, squid-shaped interstellar cloud spans nearly...

New Mobile Phone Forensics Tool

3 days ago

The Chinese have a new tool called Massistant Massistant is the presumed...

Security Vulnerabilities in ICEBlock

4 days ago

The ICEBlock tool has vulnerabilities The developer of ICEBlock, an iOS app...

Hacking Trains

5 days ago

Seems like an old system system that predates any care about security...

Report from the Cambridge Cybercrime Conference

6 days ago

The Cambridge Cybercrime Conference was held on 23 June. Summaries of the...

Squid Dominated the Oceans in the Late Cretaceous

9 days ago

New research One reason the early years of squids has been such...

Tradecraft in the Information Age

10 days ago

Long article on the difficulty (impossibility?) of human spying in the age...

Using Signal Groups for Activism

11 days ago

Good tutorial by Micah Lee. It includes some nonobvious use cases.

Yet Another Strava Privacy Leak

12 days ago

This time it’s the Swedish prime minister’s bodyguards. (Last year, it was...

Hiding Prompt Injections in Academic Papers

14 days ago

Academic papers were found to contain hidden instructions to LLMs It discovered...

Friday Squid Blogging: How Squid Skin Distorts Light

16 days ago

New research As usual, you can also use this squid post to...

Surveillance Used by a Drug Cartel

18 days ago

Once you build a surveillance system, you can’t control who will use...