Digital Threat Modeling Under Authoritarianism
September 26 2025Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to...
Read moreMalicious-Looking URL Creation Service
September 25 2025This site turns your URL into something sketchy-looking. For example, www.schneier.com becomes https://cheap-bitcoin.online/firewall-snatcher/cipher-injector/phishing_sniffer_tool.html?form=inject&host=spoof&id=bb1bc121¶meter=inject&payload=%28func...
Read moreUS Disrupts Massive Cell Phone Array in New York
September 24 2025This is a weird story:
The US Secret Service disrupted a network of telecommunications devices that could have shut down cellular systems as leaders gather for the United Nations...
Read more
Apple’s New Memory Integrity Enforcement
September 23 2025Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus tend to use...
Read moreDetails About Chinese Surveillance and Propaganda Companies
September 22 2025Details from leaked documents:
While people often look at China’s Great Firewall as a single, all-powerful government system unique to China, the actual process of developing and maintaining it...
Read more
Friday Squid Blogging: Giant Squid vs. Blue Whale
September 20 2025A comparison aimed at kids.
Read moreSurveying the Global Spyware Market
September 19 2025The Atlantic Council has published its second annual report: “Mythical Beasts: Diving into the depths of the global spyware market.”
Too much good detail to summarize, but here are...
Read moreTime-of-Check Time-of-Use Attacks Against LLMs
September 18 2025This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.:
Abstract: Large Language Model (LLM)-enabled agents are rapidly emerging across a wide...
Read more
Hacking Electronic Safes
September 17 2025Vulnerabilities in electronic safes that use Securam Prologic locks:
While both their techniques represent glaring security vulnerabilities, Omo says it’s the one that exploits a feature intended as a...
Read more
Recent Comments