Crypto-Gram Newsletter
Crypto-Gram is a free monthly e-mail digest of posts from Bruce Schneier’s Schneier on Security blog.
Recent Issues
July 15, 2022
In this issue:
- M1 Chip Vulnerability
- Attacking the Performance of Machine Learning Systems
- Tracking People via Bluetooth on Their Phones
- Hertzbleed: A New Side-Channel Attack
- Hidden Anti-Cryptography Provisions in Internet Anti-Trust Bills
- Symbiote Backdoor in Linux
- On the Subversion of NIST by the NSA
- On the Dangers of Cryptocurrencies and the Uselessness of Blockchain
- 2022 Workshop on Economics and Information Security (WEIS)
- When Security Locks You Out of Everything
- Ecuador’s Attempt to Resettle Edward Snowden
- ZuoRAT Malware Is Targeting Routers
- Analyzing the Swiss E-Voting System
- NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
- Ubiquitous Surveillance by ICE
- Apple’s Lockdown Mode
- Nigerian Prison Break
- Security Vulnerabilities in Honda’s Keyless Entry System
- Post-Roe Privacy
- New Browser De-anonymization Technique
- Upcoming Speaking Engagements
June 15, 2022
In this issue:
- The NSA Says that There are No Known Flaws in NIST’s Quantum-Resistant Algorithms
- Attacks on Managed Service Providers Expected to Increase
- iPhone Malware that Operates Even When the Phone Is Turned Off
- Websites that Collect Your Data as You Type
- Bluetooth Flaw Allows Remote Unlocking of Digital Locks
- The Onion on Google Map Surveillance
- Forging Australian Driver’s Licenses
- The Justice Department Will No Longer Charge Security Researchers with Criminal Hacking
- Manipulating Machine-Learning Systems through the Order of the Training Data
- Malware-Infested Smart Card Reader
- Security and Human Behavior (SHB) 2022
- The Limits of Cyber Operations in Wartime
- Clever -- and Exploitable -- Windows Zero-Day
- Remotely Controlling Touchscreens
- Me on Public-Interest Tech
- Long Story on the Accused CIA Vault 7 Leaker
- Leaking Military Secrets on Gaming Discussion Boards
- Smartphones and Civilians in Wartime
- Twitter Used Two-Factor Login Details for Ad Targeting
- Cryptanalysis of ENCSecurity’s Encryption Implementation
- Hacking Tesla’s Remote Key Cards
- Upcoming Speaking Engagements
May 15, 2022
In this issue:
- Undetectable Backdoors in Machine-Learning Models
- Clever Cryptocurrency Theft
- Long Article on NSO Group
- Java Cryptography Implementation Mistake Allows Digital-Signature Forgeries
- SMS Phishing Attacks are on the Rise
- Zero-Day Vulnerabilities Are on the Rise
- Microsoft Issues Report of Russian Cyberattacks against Ukraine
- Video Conferencing Apps Sometimes Ignore the Mute Button
- Using Pupil Reflection in Smartphone Camera Selfies
- New Sophisticated Malware
- 15.3 Million Request-Per-Second DDoS Attack
- Corporate Involvement in International Cybersecurity Treaties
- Apple Mail Now Blocks Email Trackers
- ICE Is a Domestic Surveillance Agency
- Surveillance by Driverless Car
- Upcoming Speaking Engagements
Sidebar photo of Bruce Schneier by Joe MacInnis.