Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 2260 followers

Latest posts

Last updated 2 days ago

Friday Squid Blogging: The Origin and Propagation of Squid

2 days ago

New research (paywalled) Editor’s summary: Cephalopods are one of the most successful...

My Latest Book: Rewiring Democracy

2 days ago

I am pleased to announce the imminent publication of my latest book...

GPT-4o-mini Falls for Psychological Manipulation

2 days ago

Interesting experiment To design their experiment, the University of Pennsylvania researchers tested...

Generative AI as a Cybercrime Assistant

3 days ago

Anthropic reports on a Claude user We recently disrupted a sophisticated cybercriminal...

Indirect Prompt Injection Attacks Against LLM Assistants

4 days ago

Really good research on practical attacks against LLM agents “Invitation Is All...

1965 Cryptanalysis Training Workbook Released by the NSA

5 days ago

In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros...

Friday Squid Blogging: Catching Humboldt Squid

9 days ago

First-person account of someone accidentally catching several Humboldt squid on a fishing...

Baggage Tag Scam

9 days ago

I just heard about this There’s a travel scam warning going around...

The UK May Be Dropping Its Backdoor Mandate

10 days ago

The US Director of National Intelligence is reporting that the UK government...

We Are Still Unable to Secure LLMs from Malicious Inputs

11 days ago

Nice indirect prompt injection attack Bargury’s attack starts with a poisoned document,...

Encryption Backdoor in Military/Police Radios

12 days ago

I wrote about this in 2023. Here’s the story Three Dutch security...

Poor Password Choices

13 days ago

Look at this: McDonald’s chose the password “123456” for a major corporate...