This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

Schneier on Security: Crypto-Gram

Schneier on Security

Crypto-Gram Newsletter

Crypto-Gram is a free monthly e-mail digest of posts from Bruce Schneier's Schneier on Security blog.

Recent Issues

February 15, 2019

In this issue:

  1. Alex Stamos on Content Moderation and Security
  2. El Chapo's Encryption Defeated by Turning His IT Consultant
  3. Prices for Zero-Day Exploits Are Rising
  4. Evaluating the GCHQ Exceptional Access Proposal
  5. Clever Smartphone Malware Concealment Technique
  6. Hacking Construction Cranes
  7. The Evolution of Darknets
  8. Military Carrier Pigeons in the Era of Electronic Warfare
  9. Hacking the GCHQ Backdoor
  10. Japanese Government Will Hack Citizens' IoT Devices
  11. iPhone FaceTime Vulnerability
  12. Security Analysis of the LIFX Smart Light Bulb
  13. Security Flaws in Children's Smart Watches
  14. Public-Interest Tech at the RSA Conference
  15. Facebook's New Privacy Hires
  16. Major Zcash Vulnerability Fixed
  17. Using Gmail "Dot Addresses" to Commit Fraud
  18. China's AI Strategy and its Security Implications
  19. Blockchain and Trust
  20. Cyberinsurance and Acts of War
  21. USB Cable with Embedded Wi-Fi Controller
  22. Reconstructing SIGSALY

Read This Issue →

January 15, 2019

In this issue:

  1. New Shamoon Variant
  2. Teaching Cybersecurity Policy
  3. Congressional Report on the 2017 Equifax Data Breach
  4. Fraudulent Tactics on Amazon Marketplace
  5. Drone Denial-of-Service Attack against Gatwick Airport
  6. MD5 and SHA-1 Still Used in 2018
  7. Glitter Bomb against Package Thieves
  8. Human Rights by Design
  9. Stealing Nativity Displays
  10. Massive Ad Fraud Scheme Relied on BGP Hijacking
  11. Click Here to Kill Everybody Available as an Audiobook
  12. China's APT10
  13. Long-Range Familial Searching Forensics
  14. Podcast Interview with Eva Galperin
  15. New Attack Against Electrum Bitcoin Wallets
  16. Machine Learning to Detect Software Vulnerabilities
  17. EU Offering Bug Bounties on Critical Open-Source Software
  18. Security Vulnerabilities in Cell Phone Systems
  19. Using a Fake Hand to Defeat Hand-Vein Biometrics
  20. Why Internet Security Is So Bad
  21. Upcoming Speaking Engagements

Read This Issue →

December 15, 2018

In this issue:

  1. Chip Cards Fail to Reduce Credit Card Fraud in the US
  2. Hidden Cameras in Streetlights
  3. Mailing Tech Support a Bomb
  4. Israeli Surveillance Gear
  5. Worst-Case Thinking Breeds Fear and Irrationality
  6. What Happened to Cyber 9/11?
  7. The PCLOB Needs a Director
  8. Information Attacks against Democracies
  9. Using Machine Learning to Create Fake Fingerprints
  10. How Surveillance Inhibits Freedom of Expression
  11. Propaganda and the Weakening of Trust in Government
  12. Distributing Malware By Becoming an Admin on an Open-Source Project
  13. FBI Takes Down a Massive Advertising Fraud Ring
  14. That Bloomberg Supply-Chain-Hack Story
  15. Three-Rotor Enigma Machine Up for Auction Today
  16. Click Here to Kill Everybody News
  17. The DoJ's Secret Legal Arguments to Break Cryptography
  18. Bad Consumer Security Advice
  19. Security Risks of Chatbots
  20. Your Personal Data is Already Stolen
  21. Banks Attacked through Malicious Hardware Connected to the Local Network
  22. Back Issues of the NSA's Cryptolog
  23. 2018 Annual Report from AI Now
  24. New Australian Backdoor Law
  25. Marriott Hack Reported as Chinese State-Sponsored
  26. Real-Time Attacks Against Two-Factor Authentication

Read This Issue →

More Issues →

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.