Schneier on Security

Schneier on Security A blog covering security and security technology.

  • Friday Squid Blogging: Squid Fishing in Peru
    by Bruce Schneier on February 27, 2026 at 10:04 pm

    Peru has increased its squid catch limit. The article says “giant squid,” but they can’t possibly mean that. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

  • Why Tehran’s Two-Tiered Internet Is So Dangerous
    by Bruce Schneier on February 27, 2026 at 12:05 pm

    Iran is slowly emerging from the most severe communications blackout in its history and one of the longest in the world. Triggered as part of January’s government crackdown against citizen protests nationwide, the regime implemented an internet shutdown that transcends the standard definition of internet censorship. This was not merely blocking social media or foreign websites; it was a total communications shutdown. Unlike previous Iranian internet shutdowns where Iran’s domestic intranet—the National Information Network (NIN)—remained functional to keep the banking and administrative sectors running, the 2026 blackout …

  • Phishing Attacks Against People Seeking Programming Jobs
    by Bruce Schneier on February 27, 2026 at 12:04 pm

    This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system. News article.

  • LLMs Generate Predictable Passwords
    by Bruce Schneier on February 26, 2026 at 12:07 pm

    LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven ­ for example, L , 9, m, 2, $ and # appeared in all 50 passwords, but 5 and @ only appeared in one password each, and most of the letters in the alphabet never appeared at all. There are no repeating characters within any password. Probabilistically, this would be very unlikely if the passwords were truly random ­ but Claude preferred to avoid repeating characters, possibly because it “looks like it’s less random”. …

  • Poisoning AI Training Data
    by Bruce Schneier on February 25, 2026 at 12:01 pm

    All it takes to poison AI training data is to create a website: I spent 20 minutes writing an article on my personal website titled “The best tech journalists at eating hot dogs.” Every word is a lie. I claimed (without evidence) that competitive hot-dog-eating is a popular hobby among tech reporters and based my ranking on the 2026 South Dakota International Hot Dog Championship (which doesn’t exist). I ranked myself number one, obviously. Then I listed a few fake reporters and real journalists who gave me permission…. Less than 24 hours later, the world’s leading chatbots were blabbering about my world-class hot dog skills. When I asked about the best hot-dog-eating tech journalists, Google parroted the gibberish from my website, both in the Gemini app and AI Overviews, the AI responses at the top of Google Search. ChatGPT did the same thing, though Claude, a chatbot made by the company Anthropic, wasn’t fooled…

  • Is AI Good for Democracy?
    by Bruce Schneier on February 24, 2026 at 12:06 pm

    Politicians fixate on the global race for technological supremacy between US and China. They debate geopolitical implications of chip exports, latest model releases from each country, and military applications of AI. Someday, they believe, we might see advancements in AI tip the scales in a superpower conflict. But the most important arms race of the 21st century is already happening elsewhere and, while AI is definitely the weapon of choice, combatants are distributed across dozens of domains. Academic journals are flooded with AI-generated papers, and are turning to AI to help review submissions. Brazil’s …

  • On the Security of Password Managers
    by Bruce Schneier on February 23, 2026 at 12:03 pm

    Good article on password managers that secretly have a backdoor. New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. The researchers reverse-engineered or closely analyzed Bitwarden, Dashlane, and LastPass and identified ways that someone with control over the server­—either administrative or the result of a compromise­—can, in fact, steal data and, in some cases, entire vaults. The researchers also devised other attacks that can weaken the encryption to the point that ciphertext can be converted to plaintext…

  • Friday Squid Blogging: Squid Cartoon
    by Bruce Schneier on February 20, 2026 at 10:05 pm

    I like this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

  • Ring Cancels Its Partnership with Flock
    by Bruce Schneier on February 20, 2026 at 12:08 pm

    It’s a demonstration of how toxic the surveillance-tech company Flock has become when Amazon’s Ring cancels the partnership between the two companies. As Hamilton Nolan advises, remove your Ring doorbell.

  • Malicious AI
    by Bruce Schneier on February 19, 2026 at 12:05 pm

    Interesting: Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI agents executing blackmail threats. Part 2 of the story. And a Wall Street Journal article. EDITED TO ADD (2/20) Here are parts 3, and 4 of the story…

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.