Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 2260 followers

Latest posts

Last updated 1 day ago

Assessing the Quality of Dried Squid

1 day ago

Research Nondestructive detection of multiple dried squid qualities by hyperspectral imaging combined...

A Cyberattack Victim Notification Framework

1 day ago

Interesting analysis When cyber incidents occur, victims should be notified in a...

New Cryptanalysis of the Fiat-Shamir Protocol

5 days ago

A couple of months ago, a new paper demonstrated some new attacks...

Signed Copies of Rewiring Democracy

5 days ago

When I announced my latest book last week, I forgot to mention...

AI in Government

6 days ago

Just a few months after Elon Musk’s retreat from his unofficial role...

Friday Squid Blogging: The Origin and Propagation of Squid

8 days ago

New research (paywalled) Editor’s summary: Cephalopods are one of the most successful...

My Latest Book: Rewiring Democracy

8 days ago

I am pleased to announce the imminent publication of my latest book...

GPT-4o-mini Falls for Psychological Manipulation

9 days ago

Interesting experiment To design their experiment, the University of Pennsylvania researchers tested...

Generative AI as a Cybercrime Assistant

10 days ago

Anthropic reports on a Claude user We recently disrupted a sophisticated cybercriminal...

Indirect Prompt Injection Attacks Against LLM Assistants

11 days ago

Really good research on practical attacks against LLM agents “Invitation Is All...

1965 Cryptanalysis Training Workbook Released by the NSA

12 days ago

In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros...

Friday Squid Blogging: Catching Humboldt Squid

15 days ago

First-person account of someone accidentally catching several Humboldt squid on a fishing...