Schneier on Security

Friday Squid Blogging: Searching for the Colossal Squid

2024-04-26 21:07

Long Article on GM Spying on Its Cars’ Drivers

2024-04-26 11:01

The Rise of Large-Language-Model Optimization

2024-04-25 11:02

Dan Solove on Privacy Regulation

2024-04-24 11:05

Microsoft and Security Incentives

2024-04-23 11:09

Using Legitimate GitHub URLs for Malware

2024-04-22 15:26

Friday Squid Blogging: Squid Trackers

2024-04-19 21:05

Other Attempts to Take Over Open Source Projects

2024-04-18 11:06

Using AI-Generated Legislative Amendments as a Delaying Technique

2024-04-17 11:08

X.com Automatically Changing Link Text but Not URLs

2024-04-16 11:00

New Lattice Cryptanalytic Technique

2024-04-15 11:04

Upcoming Speaking Engagements

2024-04-14 16:02

Friday Squid Blogging: The Awfulness of Squid Fishing Boats

2024-04-12 21:08

Smuggling Gold by Disguising it as Machine Parts

2024-04-12 11:01

Backdoor in XZ Utils That Almost Happened

2024-04-11 11:01

History of RSA Conference. Bruce Schneier. The First ‘Exhibitor’ in 1994.

2024-04-11 05:52

In Memoriam: Ross Anderson, 1956-2024

2024-04-10 11:08

In Memoriam: Ross Anderson, 1956–2024

2024-04-10 11:08

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack

2024-04-09 13:56

Security Vulnerability of HTML Emails

2024-04-08 11:03

Friday Squid Blogging: SqUID Bots

2024-04-05 21:02

Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed

2024-04-05 11:00

Surveillance by the New Microsoft Outlook App

2024-04-04 11:07

Class-Action Lawsuit against Google’s Incognito Mode

2024-04-03 11:01

XZ Utils Backdoor

2024-04-02 18:50

xz Utils Backdoor

2024-04-02 18:50

Declassified NSA Newsletters

2024-04-02 17:05

Magic Security Dust

2024-04-01 14:19

Ross Anderson

2024-04-01 00:21

Friday Squid Blogging: The Geopolitics of Eating Squid

2024-03-29 21:02

Lessons from a Ransomware Attack against the British Library

2024-03-29 11:03

Hardware Vulnerability in Apple’s M-Series Chips

2024-03-28 11:05

Security Vulnerability in Saflok’s RFID-Based Keycard Locks

2024-03-27 11:01

On Secure Voting Systems

2024-03-26 11:08

AI and Trust

2024-03-26 09:01

Licensing AI Engineers

2024-03-25 11:04

Friday Squid Blogging: New Species of Squid Discovered

2024-03-22 21:03

Google Pays $10M in Bug Bounties in 2023

2024-03-22 11:01

Public AI as an Alternative to Corporate AI

2024-03-21 11:03

Cheating Automatic Toll Booths by Obscuring License Plates

2024-03-20 11:08

AI and the Evolution of Social Media

2024-03-19 11:05

Drones and the US Air Force

2024-03-18 11:03

Friday Squid Blogging: Operation Squid

2024-03-15 21:08

Improving C++

2024-03-15 11:05

Automakers Are Sharing Driver Data with Insurers without Consent

2024-03-14 11:01

Burglars Using Wi-Fi Jammers to Disable Security Cameras

2024-03-13 11:07

Jailbreaking LLMs with ASCII Art

2024-03-12 11:12

Using LLMs to Unredact Text

2024-03-11 11:01

Friday Squid Blogging: New Plant Looks Like a Squid

2024-03-08 22:11

Essays from the Second IWORD

2024-03-08 18:38

A Taxonomy of Prompt Injection Attacks

2024-03-08 12:06

How Public AI Can Strengthen Democracy

2024-03-07 12:00

Surveillance through Push Notifications

2024-03-06 12:06

The Insecurity of Video Doorbells

2024-03-05 12:05

LLM Prompt Injection Worm

2024-03-04 12:01

Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered

2024-03-01 22:05

NIST Cybersecurity Framework 2.0

2024-03-01 12:08

How the “Frontier” Became the Slogan of Uncontrolled AI

2024-02-29 12:00

A Cyber Insurance Backstop

2024-02-28 12:02

China Surveillance Company Hacked

2024-02-27 12:03

Apple Announces Post-Quantum Encryption Algorithms for iMessage

2024-02-26 12:04

Friday Squid Blogging: Illex Squid and Climate Change

2024-02-23 22:04

AIs Hacking Websites

2024-02-23 16:14

New Image/Video Prompt Injection Attacks

2024-02-22 17:08

Details of a Phone Scam

2024-02-21 12:08

Microsoft Is Spying on Users of Its AI Tools

2024-02-20 12:02

EU Court of Human Rights Rejects Encryption Backdoors

2024-02-19 16:15

Friday Squid Blogging: Vegan Squid-Ink Pasta

2024-02-16 22:04

On the Insecurity of Software Bloat

2024-02-15 12:04

Upcoming Speaking Engagements

2024-02-14 17:01

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

2024-02-14 12:08

A Hacker’s Mind is Out in Paperback

2024-02-13 20:13

Molly White Reviews Blockchain Book

2024-02-13 12:07

On Passkey Usability

2024-02-12 16:49

Friday Squid Blogging: A Penguin Named “Squid”

2024-02-09 22:09

No, Toothbrushes Were Not Used in a Massive DDoS Attack

2024-02-09 18:10

On Software Liabilities

2024-02-08 12:00

Teaching LLMs to Be Deceptive

2024-02-07 12:04

Documents about the NSA’s Banning of Furby Toys in the 1990s

2024-02-06 17:03

Deepfake Fraud

2024-02-05 16:10

Friday Squid Blogging: Illex Squid in Argentina Waters

2024-02-02 22:03

David Kahn

2024-02-02 20:06

A Self-Enforcing Protocol to Solve Gerrymandering

2024-02-02 12:01

Facebook’s Extensive Surveillance Network

2024-02-01 12:06

CFPB’s Proposed Data Rules

2024-01-31 12:04

New Images of Colossus Released

2024-01-30 20:08

NSA Buying Bulk Surveillance Data on Americans without a Warrant

2024-01-30 12:12

Microsoft Executives Hacked

2024-01-29 12:03

Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her Eggs

2024-01-26 22:10

Chatbots and Human Conversation

2024-01-26 12:09

Quantum Computing Skeptics

2024-01-25 12:04

Poisoning AI Models

2024-01-24 12:06

Side Channels Are Common

2024-01-23 12:09

AI Bots on X (Twitter)

2024-01-22 12:09

Friday Squid Blogging: New Foods from Squid Fins

2024-01-19 22:07

Zelle Is Using My Name and Voice without My Consent

2024-01-19 20:05

Speaking to the CIA’s Creative Writing Group

2024-01-19 12:21

Canadian Citizen Gets Phone Back from Police

2024-01-18 12:02

Code Written with AI Assistants Is Less Secure

2024-01-17 12:14

The Story of the Mirai Botnet

2024-01-16 12:21

Voice Cloning with Very Short Samples

2024-01-15 12:09

Upcoming Speaking Engagements

2024-01-14 17:01

Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s

2024-01-12 22:06

On IoT Devices and Software Liability

2024-01-12 12:03

Pharmacies Giving Patient Records to Police without Warrants

2024-01-11 12:09

Facial Scanning by Burger King in Brazil

2024-01-10 12:05

PIN-Stealing Android Malware

2024-01-09 12:03

Second Interdisciplinary Workshop on Reimagining Democracy

2024-01-08 12:03

Friday Squid Blogging—18th Anniversary Post: New Species of Pygmy Squid Discovered

2024-01-05 22:05

Improving Shor’s Algorithm

2024-01-05 12:07

New iPhone Exploit Uses Four Zero-Days

2024-01-04 12:11

Facial Recognition Systems in the US

2024-01-03 12:07

TikTok Editorial Analysis

2024-01-02 12:04

AI Is Scarily Good at Guessing the Location of Random Photos

2023-12-29 12:03

Friday Squid Blogging: Sqids

2023-12-29 10:08

AI and Lossy Bottlenecks

2023-12-28 12:01

New iPhone Security Features to Protect Stolen Devices

2023-12-27 12:01

Google Stops Collecting Location Data from Maps

2023-12-26 12:03

Friday Squid Blogging: Squid Parts into Fertilizer

2023-12-22 22:08

Ben Rothke’s Review of A Hacker’s Mind

2023-12-22 20:08

Data Exfiltration Using Indirect Prompt Injection

2023-12-22 12:05

Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists

2023-12-21 12:10

GCHQ Christmas Codebreaking Challenge

2023-12-20 12:05

OpenAI Is Not Training on Your Dropbox Documents—Today

2023-12-19 12:09

Police Get Medical Records without a Warrant

2023-12-18 15:37

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

2023-12-15 22:06

A Robot the Size of the World

2023-12-15 12:01

Surveillance Cameras Disguised as Clothes Hooks

2023-12-14 16:23

Surveillance by the US Postal Service

2023-12-13 12:04

New Windows/Linux Firmware Attack

2023-12-12 12:01

Facebook Enables Messenger End-to-End Encryption by Default

2023-12-11 12:10

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code

2023-12-08 22:03

New Bluetooth Attack

2023-12-08 12:05

Spying through Push Notifications

2023-12-07 12:02

Security Analysis of a Thirteenth-Century Venetian Election Protocol

2023-12-06 18:18

AI and Mass Spying

2023-12-05 12:10

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying.

2023-12-05 12:10

AI and Trust

2023-12-04 12:05

Friday Squid Blogging: Strawberry Squid in the Galápagos

2023-12-01 22:05

AI Decides to Engage in Insider Trading

2023-12-01 12:03

Extracting GPT’s Training Data

2023-11-30 16:48

Breaking Laptop Fingerprint Sensors

2023-11-29 12:09

Digital Car Keys Are Coming

2023-11-28 20:19

Secret White House Warrantless Surveillance Program

2023-11-27 11:59

Friday Squid Blogging: Squid Nebula

2023-11-24 22:04

Chocolate Swiss Army Knife

2023-11-24 20:00

LitterDrifter USB Worm

2023-11-24 12:04

Apple to Add Manual Authentication to iMessage

2023-11-22 12:08

Email Security Flaw Found in the Wild

2023-11-21 12:05

Using Generative AI for Surveillance

2023-11-20 11:57

Friday Squid Blogging: Unpatched Vulnerabilities in the Squid Caching Proxy

2023-11-17 22:01

Ransomware Gang Files SEC Complaint

2023-11-17 16:31

FTC’s Voice Cloning Challenge

2023-11-16 18:46

Leaving Authentication Credentials in Public Code

2023-11-16 12:10

New SSH Vulnerability

2023-11-15 17:51

Upcoming Speaking Engagements

2023-11-14 17:01

How .tk Became a TLD for Scammers

2023-11-14 12:06

Ten Ways AI Will Change Democracy

2023-11-13 12:09

Friday Squid Blogging: The History and Morality of US Squid Consumption

2023-11-10 22:04

The Privacy Disaster of Modern Smart Cars

2023-11-10 12:07

Online Retail Hack

2023-11-09 12:09

Decoupling for Security

2023-11-08 12:08

Spaf on the Morris Worm

2023-11-07 12:08

Crashing iPhones with a Flipper Zero

2023-11-06 14:45

Friday Squid Blogging: Eating Dancing Squid

2023-11-03 21:05

New York Increases Cybersecurity Rules for Financial Companies

2023-11-03 11:01

Spyware in India

2023-11-02 11:07

The Future of Drone Warfare

2023-10-31 11:03

Hacking Scandinavian Alcohol Tax

2023-10-30 11:10

Friday Squid Blogging: On the Ugliness of Squid Fishing

2023-10-27 21:13

Messaging Service Wiretap Discovered through Expired TLS Cert

2023-10-27 11:01

New NSA Information from (and About) Snowden

2023-10-26 11:00

Microsoft is Soft-Launching Security Copilot

2023-10-25 11:07

EPA Won’t Force Water Utilities to Audit Their Cybersecurity

2023-10-24 11:02

Child Exploitation and the Crypto Wars

2023-10-23 11:08

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums

2023-10-20 21:03

AI and US Election Rules

2023-10-20 11:10

Former Uber CISO Appealing His Conviction

2023-10-19 11:08

Analysis of Intellexa’s Predator Spyware

2023-10-18 11:06

Security Vulnerability of Switzerland’s E-Voting System

2023-10-17 11:11

Coin Flips Are Biased

2023-10-16 11:06

Friday Squid Blogging: On Squid Intelligence

2023-10-13 21:09

Hacking the High School Grading System

2023-10-13 11:12

Bounty to Recover NIST’s Elliptic Curve Seeds

2023-10-12 11:09

Cisco Can’t Stop Using Hard-Coded Passwords

2023-10-11 11:04

Model Extraction Attack on Neural Networks

2023-10-10 11:09

AI Risks

2023-10-09 11:03

Deepfake Election Interference in Slovakia

2023-10-06 07:04

Political Disinformation and AI

2023-10-05 11:12

Malicious Ads in Bing Chat

2023-10-04 11:08

Hacking Gas Pumps via Bluetooth

2023-10-03 11:01

NSA AI Security Center

2023-10-02 16:40

Friday Squid Blogging: Protecting Cephalopods in Medical Research

2023-09-29 21:07

Critical Vulnerability in libwebp Library

2023-09-27 11:08

Signal Will Leave the UK Rather Than Add a Backdoor

2023-09-26 11:15

Friday Squid Blogging: New Squid Species

2023-09-22 21:09

New Revelations from the Snowden Documents

2023-09-21 11:03

On the Cybersecurity Jobs Shortage

2023-09-20 11:06

Detecting AI-Generated Text

2023-09-19 11:08

Using Hacked LastPass Keys to Steal Cryptocurrency

2023-09-18 11:02

Friday Squid Blogging: Cleaning Squid

2023-09-15 21:08

LLM Summary of My Book Beyond Fear

2023-09-15 19:12

On Technologies for Automatic Facial Recognition

2023-09-15 11:15

Upcoming Speaking Engagements

2023-09-14 16:01

Fake Signal and Telegram Apps in the Google Play Store

2023-09-14 11:05

Zero-Click Exploit in iPhones

2023-09-13 11:13

Cars Have Terrible Data Privacy

2023-09-12 11:20

On Robots Killing People

2023-09-11 11:04

Friday Squid Blogging: Glass Squid Video

2023-09-08 21:03

LLMs and Tool Use

2023-09-08 11:05

The Hacker Tool to Get Personal Data from Credit Bureaus

2023-09-07 11:09

Cryptocurrency Startup Loses Encryption Key for Electronic Wallet

2023-09-06 11:05

Inconsistencies in the Common Vulnerability Scoring System (CVSS)

2023-09-05 11:03

Friday Squid Blogging: We’re Genetically Engineering Squid Now

2023-09-01 21:29

Spyware Vendor Hacked

2023-09-01 11:07

Own Your Own Government Surveillance Van

2023-08-31 11:06

When Apps Go Rogue

2023-08-30 13:39

Identity Theft from 1965 Uncovered through Face Recognition

2023-08-29 11:03

Remotely Stopping Polish Trains

2023-08-28 11:05

Friday Squid Blogging: China’s Squid Fishing Ban Ineffective

2023-08-25 21:06

Hacking Food Labeling Laws

2023-08-25 11:03

Parmesan Anti-Forgery Protection

2023-08-24 11:24

December’s Reimagining Democracy Workshop

2023-08-23 11:06

Applying AI to License Plate Surveillance

2023-08-22 11:04

White House Announces AI Cybersecurity Challenge

2023-08-21 11:10

Friday Squid Blogging: Squid Brand Fish Sauce

2023-08-18 21:02

Bots Are Better than Humans at Solving CAPTCHAs

2023-08-18 11:04

Detecting “Violations of Social Norms” in Text with AI

2023-08-17 11:07

UK Electoral Commission Hacked

2023-08-16 11:17

Zoom Can Spy on Your Calls and Use the Conversation to Train AI, But Says That It Won’t

2023-08-15 11:03

China Hacked Japan’s Military Networks

2023-08-14 11:02

Friday Squid Blogging: NIWA Annual Squid Survey

2023-08-11 21:09

The Inability to Simultaneously Verify Sentience, Location, and Identity

2023-08-11 11:08

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet

2023-08-10 11:12

Using Machine Learning to Detect Keystrokes

2023-08-09 11:08

You Can’t Rush Post-Quantum-Computing Cryptography Standards

2023-08-08 11:13

Microsoft Signing Key Stolen by Chinese

2023-08-07 11:03

Friday Squid Blogging: 2023 Squid Oil Global Market Report

2023-08-04 21:07

Political Milestones for AI

2023-08-04 11:07

The Need for Trustworthy AI

2023-08-03 11:17

New SEC Rules around Cybersecurity Incident Disclosures

2023-08-02 11:04

Hacking AI Resume Screening with Text in a White Font

2023-08-01 11:11

Automatically Finding Prompt Injection Attacks

2023-07-31 11:03

Friday Squid Blogging: Zaqistan Flag

2023-07-28 21:01

Indirect Instruction Injection in Multi-Modal LLMs

2023-07-28 11:06

Fooling an AI Article Writer

2023-07-27 11:04

Backdoor in TETRA Police Radios

2023-07-26 11:05

New York Using AI to Detect Subway Fare Evasion

2023-07-25 11:05

Google Reportedly Disconnecting Employees from the Internet

2023-07-24 11:09

Friday Squid Blogging: Chromatophores

2023-07-21 21:10

AI and Microdirectives

2023-07-21 11:16

Kevin Mitnick Died

2023-07-20 19:44

Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy

2023-07-20 11:12

Practice Your Security Prompting Skills

2023-07-19 17:03

Disabling Self-Driving Cars with a Traffic Cone

2023-07-18 11:13

Tracking Down a Suspect through Cell Phone Records

2023-07-17 11:13

Friday Squid Blogging: Balloon Squid

2023-07-14 21:00

Buying Campaign Contributions as a Hack

2023-07-14 11:09

French Police Will Be Able to Spy on People through Their Cell Phones

2023-07-13 11:20

Google Is Using Its Vast Data Stores to Train AI

2023-07-12 14:50

Privacy of Printing Services

2023-07-11 11:57

Wisconsin Governor Hacks the Veto Process

2023-07-10 11:24

Friday Squid Blogging: Giant Squid Nebula

2023-07-07 21:08

The AI Dividend

2023-07-07 11:11

Belgian Tax Hack

2023-07-06 11:03

Class-Action Lawsuit for Scraping Data without Permission

2023-07-05 11:14

The Password Game

2023-07-04 11:12

Self-Driving Cars Are Surveillance Cameras on Wheels

2023-07-03 11:04

Friday Squid Blogging: See-Through Squid

2023-06-30 20:58

The US Is Spying on the UN Secretary General

2023-06-30 11:02

Redacting Documents with a Black Sharpie Doesn’t Work

2023-06-29 14:37

Stalkerware Vendor Hacked

2023-06-28 11:17

Typing Incriminating Evidence in the Memo Field

2023-06-27 20:36

Excel Data Forensics

2023-06-26 15:36

Friday Squid Blogging: Giggling Squid

2023-06-23 21:06

UPS Data Harvested for SMS Phishing Attacks

2023-06-23 14:55

AI as Sensemaking for Public Comments

2023-06-22 15:43

Ethical Problems in Computer Security

2023-06-21 17:54

Power LED Side-Channel Attack

2023-06-19 10:52

Friday Squid Blogging: Squid Can Edit Their RNA

2023-06-16 21:13

Security and Human Behavior (SHB) 2023

2023-06-16 19:07

On the Need for an AI Public Option

2023-06-14 11:02

Identifying the Idaho Killer

2023-06-13 11:03

AI-Generated Steganography

2023-06-12 11:18

Friday Squid Blogging: Light-Emitting Squid

2023-06-09 21:05

Operation Triangulation: Zero-Click iPhone Malware

2023-06-09 11:12

Paragon Solutions Spyware: Graphite

2023-06-08 11:30

How Attorneys Are Harming Cybersecurity Incident Response

2023-06-07 11:06

Snowden Ten Years Later

2023-06-06 11:17

The Software-Defined Car

2023-06-05 11:14

Friday Squid Blogging: Squid Chromolithographs

2023-06-02 21:13

Open-Source LLMs

2023-06-02 14:21

On the Catastrophic Risk of AI

2023-06-01 11:17

Chinese Hacking of US Critical Infrastructure

2023-05-31 14:53

Brute-Forcing a Fingerprint Reader

2023-05-30 11:16

Friday Squid Blogging: Online Cephalopod Course

2023-05-26 21:05

Expeditionary Cyberspace Operations

2023-05-26 11:12

On the Poisoning of LLMs

2023-05-25 11:05

Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws

2023-05-24 11:23

Credible Handwriting Machine

2023-05-23 11:15