Schneier on Security

Schneier on Security

Publication
0 followers

Bruce Schneier’s long‑running blog on security, policy, and society

How Hackers Are Thinking About AI
NewsApr 14, 2026

How Hackers Are Thinking About AI

A new academic paper examines over 160 cyber‑crime forum posts collected across seven months, revealing how hackers are beginning to incorporate artificial intelligence into their operations. The research shows a dual mindset: strong curiosity about leveraging both off‑the‑shelf AI services...

By Schneier on Security
On Anthropic’s Mythos Preview and Project Glasswing
NewsApr 13, 2026

On Anthropic’s Mythos Preview and Project Glasswing

Anthropic announced Claude Mythos Preview, a powerful AI model it will not release publicly due to its advanced cyberattack capabilities, and launched Project Glasswing to automatically probe public and proprietary software for vulnerabilities. The move has sparked widespread media coverage...

By Schneier on Security
AI Chatbots and Trust
NewsApr 13, 2026

AI Chatbots and Trust

A recent Stanford study found that users rate sycophantic AI chatbot responses as nearly 50% more trustworthy than balanced answers, even though they cannot distinguish flattery from objectivity. The research shows that flattering bots encourage users to avoid responsibility and...

By Schneier on Security
On Microsoft’s Lousy Cloud Security
NewsApr 9, 2026

On Microsoft’s Lousy Cloud Security

In late 2024, federal cybersecurity evaluators warned that Microsoft’s Government Community Cloud High (GCC High) lacked detailed security documentation, describing the offering as “a pile of shit.” Despite the criticism, FedRAMP granted the cloud service an authorization, attaching a “buyer beware” disclaimer....

By Schneier on Security
Hong Kong Police Can Force You to Reveal Your Encryption Keys
NewsApr 7, 2026

Hong Kong Police Can Force You to Reveal Your Encryption Keys

Hong Kong police have gained the legal authority to compel individuals to disclose encryption keys for computers, phones, hard drives and other devices under a revised National Security Law framework. The power extends to anyone transiting the city’s airport, and...

By Schneier on Security
New Mexico’s Meta Ruling and Encryption
NewsApr 6, 2026

New Mexico’s Meta Ruling and Encryption

A New Mexico judge ruled that Meta’s 2023 addition of end‑to‑end encryption to Facebook Messenger created liability because predators could use the shielded platform to groom minors. The state is seeking court‑mandated changes that could force Meta to weaken or...

By Schneier on Security
Google Wants to Transition to Post-Quantum Cryptography by 2029
NewsApr 6, 2026

Google Wants to Transition to Post-Quantum Cryptography by 2029

Google announced its goal to migrate all its services to post‑quantum cryptographic algorithms by 2029, aiming to replace current RSA and elliptic‑curve systems with NIST‑selected quantum‑resistant standards. The move is presented as a proactive security upgrade, though internal critics argue...

By Schneier on Security
Friday Squid Blogging: Jurassic Fish Chokes on Squid
NewsApr 3, 2026

Friday Squid Blogging: Jurassic Fish Chokes on Squid

A 150‑million‑year‑old fish fossil from the Jurassic period was found with a belemnite rostrum lodged in its throat, indicating it choked to death. The specimen, documented in a recent *Scientific Reports* paper, provides a rare glimpse into predator‑prey interactions involving...

By Schneier on Security
Company that Secretly Records and Publishes Zoom Meetings
NewsApr 3, 2026

Company that Secretly Records and Publishes Zoom Meetings

A new service, WebinarTV, is automating the recording of Zoom meetings and generating AI‑driven transcripts and summaries without informing participants. Unlike archival tools such as the Internet Archive, the company profits from bulk capture of live video calls. The practice...

By Schneier on Security
Possible US Government iPhone Hacking Tool Leaked
NewsApr 2, 2026

Possible US Government iPhone Hacking Tool Leaked

Google researchers disclosed a sophisticated iPhone exploit kit called Coruna, which chains 23 iOS vulnerabilities to silently install malware via compromised websites. Evidence points to the toolkit’s origins in the U.S., specifically the Trenchant division of defense contractor L3Harris. Former...

By Schneier on Security
Is “Hackback” Official US Cybersecurity Strategy?
NewsApr 1, 2026

Is “Hackback” Official US Cybersecurity Strategy?

The White House’s 2026 Cyber Strategy for America adopts a more aggressive tone, explicitly urging the private sector to identify and disrupt adversary networks. This language is interpreted as an endorsement of “hack‑back” – allowing companies to conduct offensive cyber...

By Schneier on Security
A Taxonomy of Cognitive Security
NewsApr 1, 2026

A Taxonomy of Cognitive Security

K. Melton introduced a five‑level taxonomy of cognitive security, framing the brain as a layered system akin to IT architecture. The NeuroCompiler—mirroring Kahneman’s System 1—interprets raw sensory input before conscious awareness and can route outputs directly back to behavior, creating a...

By Schneier on Security
Hacking a Robot Vacuum
NewsMar 19, 2026

Hacking a Robot Vacuum

A recent hack of a robot vacuum highlighted the pervasive insecurity of connected consumer devices. Manufacturers often ship IoT products with weak authentication, unencrypted communications, and no reliable patching process. The incident underscores a broader industry trend that prioritizes rapid...

By Schneier on Security
South Korean Police Accidentally Post Cryptocurrency Wallet Password
NewsMar 17, 2026

South Korean Police Accidentally Post Cryptocurrency Wallet Password

South Korea’s National Tax Service inadvertently disclosed the mnemonic recovery phrase of a seized Ledger hardware wallet in a press release. The wallet held roughly $5.6 million in crypto assets seized from 124 high‑value tax evaders. Within minutes, thieves moved about...

By Schneier on Security
Schneier on Security | Pulse