RSS.Social

Schneier on Security

follow: @[email protected]

Posts

Upcoming Speaking Engagements

Friday Squid Blogging: Increased Squid Population in the Falklands

Academia and the “AI Brain Drain”

iPhones and iPads Approved for NATO Classified Data

Canada Needs Nationalized, Public AI

Jailbreaking the F-35 Fighter Jet

New Attack Against Wi-Fi

Friday Squid Blogging: Squid in Byzantine Monk Cooking

Anthropic and the Pentagon

Claude Used to Hack Mexican Government

Israel Hacked Traffic Cameras in Iran

Hacked App Part of US/Israeli Propaganda Campaign Against Iran

Manipulating AI Summarization Features

On Moltbook

LLM-Assisted Deanonymization

Friday Squid Blogging: Squid Fishing in Peru

Why Tehran’s Two-Tiered Internet Is So Dangerous

Phishing Attacks Against People Seeking Programming Jobs

LLMs Generate Predictable Passwords

Poisoning AI Training Data

Is AI Good for Democracy?

On the Security of Password Managers

Friday Squid Blogging: Squid Cartoon

Ring Cancels Its Partnership with Flock

Malicious AI

AI Found Twelve New Vulnerabilities in OpenSSL

Side-Channel Attacks Against LLMs

The Promptware Kill Chain

Upcoming Speaking Engagements

Friday Squid Blogging: Do Squid Dream?

3D Printer Surveillance

Rewiring Democracy Ebook is on Sale

Prompt Injection Via Road Signs

AI-Generated Text and the Detection Arms Race

LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days

Friday Squid Blogging: Squid Fishing Tips

I Am in the Epstein Files

iPhone Lockdown Mode Protects Washington Post Reporter

Backdoor in Notepad++

US Declassifies Information on JUMPSEAT Spy Satellites

Microsoft is Giving the FBI BitLocker Keys

AI Coding Assistants Secretly Copying All Code to China

Friday Squid Blogging: New Squid Species Discovered

AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

The Constitutionality of Geofence Warrants

Ireland Proposes Giving Police New Digital Surveillance Powers

Friday Squid Blogging: Giant Squid in the Star Trek Universe

AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

Why AI Keeps Falling for Prompt Injection Attacks

Internet Voting is Too Insecure for Use in Elections

Could ChatGPT Convince You to Buy Something?

AI-Powered Surveillance in Schools

AI and the Corporate Capture of Knowledge

New Vulnerability in n8n

Hacking Wheelchairs over Bluetooth

Upcoming Speaking Engagements

1980s Hacker Manifesto

Corrupting LLMs Through Weird Generalizations

Friday Squid Blogging: The Chinese Squid-Fishing Fleet off the Argentine Coast

Palo Alto Crosswalk Signals Had Default Passwords

AI & Humans: Making the Relationship Work

The Wegman’s Supermarket Chain Is Probably Using Facial Recognition

A Cyberattack Was Part of the US Assault on Venezuela

Telegram Hosting World’s Largest Darknet Market

Friday Squid Blogging: Squid Found in Light Fixture

Flock Exposes Its AI-Enabled Surveillance Cameras

LinkedIn Job Scams

Using AI-Generated Images to Get Refunds

Are We Ready to Be Governed by Artificial Intelligence?

Friday Squid Blogging: Squid Camouflage

IoT Hack

Urban VPN Proxy Surreptitiously Intercepts AI Chats

Denmark Accuses Russia of Conducting Two Cyberattacks

Microsoft Is Finally Killing RC4

Friday Squid Blogging: Petting a Squid

AI Advertising Company Hacked

Someone Boarded a Plane at Heathrow Without a Ticket or Passport

Deliberate Internet Shutdowns

Chinese Surveillance and AI

Against the Federal Moratorium on State-Level Regulation of AI

Upcoming Speaking Engagements

Friday Squid Blogging: Giant Squid Eating a Diamondback Squid

Building Trustworthy AI Agents

AIs Exploiting Smart Contracts

FBI Warns of Fake Video Scams

AI vs. Human Drivers

Substitution Cipher Based on The Voynich Manuscript

Friday Squid Blogging: Vampire Squid Genome

New Anonymous Phone Service

Like Social Media, AI Requires Difficult Choices

Banning VPNs

Friday Squid Blogging: Flying Neon Squid Found on Israeli Beach

Prompt Injection Through Poetry

Huawei and Chinese Surveillance

Four Ways AI Is Being Used to Strengthen Democracies Worldwide

IACR Nullifies Election Because of Lost Decryption Key

Friday Squid Blogging: New “Squid” Sneaker

More on Rewiring Democracy

AI as Cyberattacker

Scam USPS and E-Z Pass Texts and Websites

Legal Restrictions on Vulnerability Disclosure

AI and Voter Engagement

More Prompt||GTFO

Friday Squid Blogging: Pilot Whales Eat a Lot of Squid

Upcoming Speaking Engagements

The Role of Humans in an AI-Powered World

Book Review: The Business of Secrets

On Hacking Back

Prompt Injection in AI Browsers

New Attacks Against Secure Enclaves

Friday Squid Blogging: Squid Game: The Challenge, Season Two

Faking Receipts with AI

Rigged Poker Games

Scientists Need a Positive Vision for AI

Cybercriminals Targeting Payroll Sites

AI Summarization Optimization

Friday Squid Blogging: Giant Squid at the Smithsonian

Will AI Strengthen or Undermine Democracy?

The AI-Designed Bioweapon Arms Race

Signal’s Post-Quantum Cryptographic Implementation

Social Engineering People’s Credit Card Details

Louvre Jewel Heist

First Wap: A Surveillance Computer You’ve Never Heard Of

Friday Squid Blogging: “El Pulpo The Squid”

Part Four of The Kryptos Sculpture

Serious F5 Breach

Failures in Face Recognition

A Cybersecurity Merit Badge

Agentic AI’s OODA Loop Problem

Friday Squid Blogging: Squid Inks Philippines Fisherman

A Surprising Amount of Satellite Traffic Is Unencrypted

Cryptocurrency ATMs

Apple’s Bug Bounty Program

Upcoming Speaking Engagements

The Trump Administration’s Increased Use of Social Media Surveillance

Rewiring Democracy is Coming Soon

AI and the Future of American Politics

Friday Squid Blogging: Sperm Whale Eating a Giant Squid

Autonomous AI Hacking and the Future of Cybersecurity

Flok License Plate Surveillance

AI-Enabled Influence Operation Against Iran

AI in the 2026 Midterm Elections

Friday Squid Blogging: Squid Overfishing in the Southwest Atlantic

Daniel Miessler on the AI Attack/Defense Balance

Use of Generative AI in Scams

Details of a Scam

Abusing Notion’s AI Agent for Data Theft

Friday Squid Blogging: Jigging for Squid

Digital Threat Modeling Under Authoritarianism

Malicious-Looking URL Creation Service

US Disrupts Massive Cell Phone Array in New York

Apple’s New Memory Integrity Enforcement