Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 396 followers

Latest posts

Last updated 1 day ago

Report from the Cambridge Cybercrime Conference

1 day ago

The Cambridge Cybercrime Conference was held on 23 June. Summaries of the...

Squid Dominated the Oceans in the Late Cretaceous

5 days ago

New research One reason the early years of squids has been such...

Tradecraft in the Information Age

5 days ago

Long article on the difficulty (impossibility?) of human spying in the age...

Using Signal Groups for Activism

6 days ago

Good tutorial by Micah Lee. It includes some nonobvious use cases.

Yet Another Strava Privacy Leak

7 days ago

This time it’s the Swedish prime minister’s bodyguards. (Last year, it was...

Hiding Prompt Injections in Academic Papers

9 days ago

Academic papers were found to contain hidden instructions to LLMs It discovered...

Friday Squid Blogging: How Squid Skin Distorts Light

12 days ago

New research As usual, you can also use this squid post to...

Surveillance Used by a Drug Cartel

13 days ago

Once you build a surveillance system, you can’t control who will use...

Ubuntu Disables Spectre/Meltdown Protections

14 days ago

A whole class of speculative execution attacks against CPUs were published in...

Iranian Blackout Affected Misinformation Campaigns

15 days ago

Dozens of accounts on X that promoted Scottish independence went dark during...

How Cybersecurity Fears Affect Confidence in Voting Systems

16 days ago

American democracy runs on trust, and that trust is cracking Nearly half...

Friday Squid Blogging: What to Do When You Find a Squid “Egg Mop”

19 days ago

Tips on what to do if you find a mop of squid...