Bounty to Recover NIST's Elliptic Curve Seeds

Security Vulnerability of Switzerland's E-Voting System

Cisco can't stop using hard-coded passwords

Bruce Schneier: On the Cybersecurity Jobs Shortage

On Robots Killing People

Zoom Can Spy on Your Calls and Use the Conversation to Train AI

Microsoft Signing Key Stolen by Chinese

Buying Campaign Contributions as a Hack

The AI Dividend

French Police Will Be Able to Spy on People Through Their Cell Phones

Self-driving cars are surveillance cameras on wheels

On the Catastrophic Risk of AI

Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws

Bruce Schneier’s Plan to Reinvent Democracy

UK Threatens End-to-End Encryption

FBI is warning people against using public phone-charging stations

AI Could Write Our Laws

Human/Bear Security Trade-Off (2006)

Banning TikTok

The Coming AI Hackers (2021)

Breaking RSA with a quantum computer?

Kevin Mitnick Hacked California Law in 1983

The FBI Identified a Tor User

How to Surrender to a Drone

Charles V of Spain Secret Code Cracked

Visitors to Qatar for the World Cup need to install spyware on their phone

Signal has done a good job at misleading people about how safe it is

NIST’s Post-Quantum Cryptography Standards

Hyundai Uses Example Keys For Encryption System

On the Dangers of Cryptocurrencies and the Uselessness of Blockchain

More →