Crypto-Gram Security Podcast (podcast)
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter

Syndication

add to my PodNova

Obligatory Fine Print: The Crypto-Gram Newsletter is created by and Copyright (c) Bruce Schneier. The newsletter is hosted here in audio format with Bruce Schneier's permission. Dan Henage is responsible for creation of the audio version of the newsletter. The official site of the Crypto-Gram Newsletter is here. The Crypto-Gram Newsletter may not be reproduced, duplicated, copied, sold, resold, or otherwise exploited without the express written permission of Bruce Schneier.

Support the web hosting costs for this podcast:

Thank you to all those that have donated in the past years!

Archives:

2021
June
May
April
March
February
January

2020
December
November
October
September
August
July
June
May
April
March
February
January

2019
December
November
October
September
August
July
June
May
April
March
February
January

2018
November
October
September
August
July
June
May
April
February
January

2017
December
November
October
August
July
June
May
April
March
February
January

2016
December
November
October
September
August
July
June
May
April
March
February
January

2015
December
November
October
September
August
July
June
May
April
March
February
January

2014
December
November
October
September
August
July
June
May
April
March
February
January

2013
December
November
October
September
August
July
June
May
April
March
February
January

2012
December
November
October
September
August
July
June
May
April
March
February
January

2011
December
November
October
September
August
July
June
May
April
March
February
January

2010
December
November
October
September
August
July
June
May
April
March
February
January

2009
December
November
October
September
August
July
June
May
April
March
February
January

2008
December
November
October
September
August
July
June
May
April
March
February
January

2007
December
November
October
September
August
July
June
May
April
March
February
January

2006
December
November
October
September
August
July
June
May
April
March
February
January

2005
December
November
October
September
August

Thanks to Amplifico for the tunes!

In this issue:

  • AIs and Fake Comments
  • The Misaligned Incentives for Cloud Security
  • Vulnerabilities in Weapons Systems

from the June 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2021-06.mp3
Category:podcast -- posted at: 7:14am MDT

In this issue:

  • When AIs Start Hacking
  • Security Vulnerabilities in Cellebrite
  • Ransomware Is Getting Ugly

from the May 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2021-05.mp3
Category:podcast -- posted at: 6:14am MDT

In this issue:

  • Illegal Content and the Blockchain
  • Details of a Computer Banking Scam
  • The FBI Is Now Securing Networks Without Their Owners’ Permission

from the April 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2021-04.mp3
Category:podcast -- posted at: 6:13am MDT

In this issue:

  • National Security Risks of Late-Stage Capitalism
  • More on the Chinese Zero-Day Microsoft Exchange Hack

from the March 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2021-03.mp3
Category:podcast -- posted at: 4:11am MDT

In this issue:

  • Cell Phone Location Privacy
  • Presidential Cybersecurity and Pelotons

from the February 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2021-02.mp3
Category:podcast -- posted at: 3:10am MDT

In this issue:

  • Mexican Drug Cartels with High-Tech Spyware
  • US Schools Are Buying Cell Phone Unlocking Systems
  • Eavesdropping on Phone Taps from Voice Assistants
  • Russia’s SolarWinds Attack and Software Security

from the January 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2021-01.mp3
Category:podcast -- posted at: 2:11am MDT

In this issue:

  • Indistinguishability Obfuscation
  • More on the Security of the 2020 US Election
  • Undermining Democracy
  • Should There Be Limits on Persuasive Technologies?

from the December 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-12.mp3
Category:podcast -- posted at: 1:11am MDT

In this issue:

  • The Security Failures of Online Exam Proctoring
  • “Privacy Nutrition Labels” in Apple’s App Store
  • Inrupt’s Solid Announcement

from the November 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-11.mp3
Category:podcast -- posted at: 12:00pm MDT

In this issue:

  • Documented Death from a Ransomware Attack
  • COVID-19 and Acedia
  • Google Responds to Warrants for “About” Searches

from the October 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-10.mp3
Category:podcast -- posted at: 11:14am MDT

In this issue:

  • Copying a Key by Listening to It in Action
  • Identifying People by Their Browsing Histories
  • Cory Doctorow on The Age of Surveillance Capitalism
  • US Postal Service Files Blockchain Voting Patent

from the September 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-09.mp3
Category:podcast -- posted at: 10:12am MDT

In this issue:

  • On the Twitter Hack
  • Survey of Supply Chain Attacks

from the August 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-08.mp3
Category:podcast -- posted at: 9:11am MDT

In this issue:

  • Eavesdropping on Sound Using Variations in Light Bulbs
  • Zoom Will Be End-to-End Encrypted for All Users
  • COVID-19 Risks of Flying
  • iPhone Apps Stealing Clipboard Data
  • Securing the International IoT Supply Chain
  • The Security Value of Inefficiency

from the July 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-07.mp3
Category:podcast -- posted at: 8:06am MDT

In this issue:

  • Bart Gellman on Snowden
  • Zoom's Commitment to User Security Depends on Whether you Pay It or Not

from the June 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-06.mp3
Category:podcast -- posted at: 7:26am MDT

In this issue:

  • Automatic Instacart Bots
  • Securing Internet Videoconferencing Apps: Zoom and Others
  • Me on COVID-19 Contact Tracing Apps

from the May 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-05.mp3
Category:podcast -- posted at: 6:09am MDT

In this issue:

  • Work-from-Home Security Advice
  • Emergency Surveillance During COVID-19 Crisis
  • Security and Privacy Implications of Zoom
  • Contact Tracing COVID-19 Infections via Smartphone Apps
  • Ransomware Now Leaking Stolen Documents

from the April 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-04.mp3
Category:podcast -- posted at: 5:14am MDT

In this issue:

  • Policy vs. Technology
  • Inrupt, Tim Berners-Lee's Solid, and Me
  • Security of Health Information

from the March 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-03.mp3
Category:podcast -- posted at: 4:09am MDT

In this issue:

  • Critical Windows Vulnerability Discovered by NSA
  • Modern Mass Surveillance: Identify, Correlate, Discriminate

from the February 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-02.mp3
Category:podcast -- posted at: 3:11am MDT

In this issue:

  • Artificial Personas and Public Discourse
  • 5G Security

from the January 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2020-01.mp3
Category:podcast -- posted at: 2:14am MDT

In this issue:

  • Reforming CDA 230
  • Scaring People into Supporting Backdoors

from the December 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-12.mp3
Category:podcast -- posted at: 1:13am MDT

In this issue:

  • Calculating the Benefits of the Advanced Encryption Standard
  • Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors
  • Technology and Policymakers

from the November 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-11.mp3
Category:podcast -- posted at: 12:12am MDT

In this issue:

  • Russians Hack FBI Comms System
  • On Chinese "Spy Trains"
  • Supply-Chain Security and Trust

from the October 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-10.mp3
Category:podcast -- posted at: 10:31am MDT

In this issue:

  • Influence Operations Kill Chain
  • The Myth of Consumer-Grade Security
  • Massive iPhone Hack Targets Uyghurs
  • When Biology Becomes Software

from the September 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-09.mp3
Category:podcast -- posted at: 10:14am MDT

In this issue:

  • Palantir's Surveillance Service for Law Enforcement
  • Zoom Vulnerability
  • Attorney General William Barr on Encryption Policy
  • How Privacy Laws Hurt Defendants
  • Brazilian Cell Phone Hack

from the August 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-08.mp3
Category:podcast -- posted at: 9:19am MDT

In this issue:

  • Data, Surveillance, and the AI Arms Race
  • Fake News and Pandemics

from the July 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-07.mp3
Category:podcast -- posted at: 8:13am MDT

In this issue:

  • First American Financial Corp. Data Records Leak
  • Fraudulent Academic Papers
  • Chinese Military Wants to Develop Custom OS
  • Computers and Video Surveillance

from the June 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-06.mp3
Category:podcast -- posted at: 6:30am MDT

In this issue:

  • China Spying on Undersea Internet Cables
  • G7 Comes Out in Favor of Encryption Backdoors
  • Defending Democracies Against Information Attacks
  • Protecting Yourself from Identity Theft
  • First Physical Retaliation for a Cyberattack
  • Leaked NSA Hacking Tools

from the May 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-05.mp3
Category:podcast -- posted at: 6:10am MDT

In this issue:

  • CAs Reissue Over One Million Weak Certificates
  • Zipcar Disruption
  • First Look Media Shutting Down Access to Snowden NSA Archives
  • Mail Fishing
  • TajMahal Spyware
  • New Version of Flame Malware Discovered

from the April 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-04.mp3
Category:podcast -- posted at: 4:30am MDT

In this issue:

  • Judging Facebook's Privacy Shift

from the March 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-03.mp3
Category:podcast -- posted at: 3:31am MDT

In this issue:

  • Evaluating the GCHQ Exceptional Access Proposal
  • Public-Interest Tech at the RSA Conference
  • Blockchain and Trust

from the February 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-02.mp3
Category:podcast -- posted at: 3:06am MDT

In this issue:

  • New Attack Against Electrum Bitcoin Wallets
  • Machine Learning to Detect Software Vulnerabilities
  • Using a Fake Hand to Defeat Hand-Vein Biometrics

from the January 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-2019-01.mp3
Category:podcast -- posted at: 1:28am MDT

In this issue:

  • Information Attacks against Democracies
  • How Surveillance Inhibits Freedom of Expression
  • Propaganda and the Weakening of Trust in Government

from the December 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-12.mp3
Category:podcast -- posted at: 12:50pm MDT

In this issue:

  • Cell Phone Security and Heads of State
  • New IoT Security Regulations
  • Oracle and "Responsible Disclosure"

from the November 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-11.mp3
Category:podcast -- posted at: 11:20am MDT

In this issue:

  • Security in a World of Physically Capable Computers

from the October 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-10.mp3
Category:podcast -- posted at: 10:30am MDT

In this issue:

  • Five-Eyes Intelligence Services Choose Surveillance Over Security
  • Security Risks of Government Hacking
  • Quantum Computing and Cryptography

from the September 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-09.mp3
Category:podcast -- posted at: 9:28am MDT

In this issue:

  • New Book Announcement: Click Here to Kill Everybody
  • Reasonably Clever Extortion E-mail Based on Password Theft
  • Defeating the iPhone Restricted Mode
  • 1Password's Travel Mode
  • SpiderOak's Warrant Canary Died
  • Don't Fear the TSA Cutting Airport Security. Be Glad That They're Talking about It.
  • Google Tracks its Users Even if They Opt-Out of Tracking

from the August 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-08.mp3
Category:podcast -- posted at: 8:31am MDT

In this issue:

  • Ridiculously Insecure Smart Lock
  • Are Free Societies at a Disadvantage in National Cybersecurity
  • Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill
  • The Effects of Iran's Telegram Ban
  • Bypassing Passcodes in iOS
  • Manipulative Social Media Practices
  • Conservation of Threat
  • California Passes New Privacy Law

from the July 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-07.mp3
Category:podcast -- posted at: 8:07am MDT

In this issue:

  • Router Vulnerability and the VPNFilter Botnet
  • E-Mail Vulnerabilities and Disclosure
  • Russian Censorship of Telegram
  • Another Spectre-Like CPU Vulnerability
  • An Example of Deterrence in Cyberspace
  • New Data Privacy Regulations

from the June 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-06.mp3
Category:podcast -- posted at: 7:12am MDT

In this issue:

  • Securing Elections
  • Details on a New PGP Vulnerability
  • Two NSA Algorithms Rejected by the ISO
  • Ray Ozzie's Encryption Backdoor
  • Supply-Chain Security

from the May 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-05.mp3
Category:podcast -- posted at: 5:27am MDT

In this issue:

  • Facebook and Cambridge Analytica
  • Israeli Security Company Attacks AMD by Publishing Zero-Day Exploits
  • Obscure E-Mail Vulnerability
  • The Digital Security Exchange Is Live

from the April 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-04.mp3
Category:podcast -- posted at: 5:02am MDT

In this issue:

  • Artificial Intelligence and the Attack/Defense Balance
  • Can Consumers' Online Data Be Protected?

from the March 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-03.mp3
Category:podcast -- posted at: 1:02am MDT

In this issue:

  • The Effects of the Spectre and Meltdown Vulnerabilities
  • After Section 702 Reauthorization
  • Cabinet of Secret Documents from Australia

from the February 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-02.mp3
Category:podcast -- posted at: 3:01am MDT

In this issue:

  • Spectre and Meltdown Attacks Against Microprocessors
  • Susan Landau's New Book: "Listening In"
  • New Book Coming in September: "Click Here to Kill Everybody"
  • Daniel Miessler on My Writings about IoT Security

from the January 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-18-01.mp3
Category:podcast -- posted at: 1:21am MDT

In this issue:

  • Warrant Protections against Police Searches of Our Data
  • Uber Data Hack
  • NSA "Red Disk" Data Leak
  • New White House Announcement on the Vulnerability Equities Process

from the December 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-12.mp3
Category:podcast -- posted at: 12:28am MDT

In this issue:

  • Me on the Equifax Breach
  • Daphne Caruana Galizia's Murder and the Security of WhatsApp
  • New KRACK Attack Against Wi-Fi Encryption
  • Fraud Detection in Pokemon Go
  • IoT Cybersecurity: What's Plan B?

from the November 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-11.mp3
Category:podcast -- posted at: 12:10am MDT

In this issue:

  • Yet Another Russian Hack of the NSA -- This Time with Kaspersky's Help
  • Changes in Password Best Practices
  • HP Shared ArcSight Source Code with Russians
  • My Writing
  • Department of Homeland Security to Collect Social Media of Immigrants and Citizens

from the October 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-10.mp3
Category:podcast -- posted at: 12:32pm MDT

In this issue:

  • On the Equifax Data Breach
  • iPhone Changes to Frustrate the Police

from the September 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-09.mp3
Category:podcast -- posted at: 10:48pm MDT

In this issue:

  • Ethereum Hack
  • Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers
  • Measuring Vulnerability Rediscovery

from the August 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-08.mp3
Category:podcast -- posted at: 9:02am MDT

In this issue:

  • Book Review: "Twitter and Tear Gas," by Zeynep Tufekci
  • Amazon Patents Measures to Prevent In-Store Comparison Shopping
  • Separating the Paranoid from the Hacked

from the July 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-07.mp3
Category:podcast -- posted at: 7:29am MDT

In this issue:

  • The Future of Ransomware
  • WannaCry and Vulnerabilities
  • NSA Brute-Force Keysearch Machine
  • NSA Abandons "About" Searches
  • Extending the Airplane Laptop Ban
  • Security and Human Behavior (SHB 2017)
  • Passwords at the Border
  • NSA Document Outlining Russian Attempts to Hack Voter Rolls
  • Who Are the Shadow Brokers?

from the June 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-06.mp3
Category:podcast -- posted at: 7:03am MDT

In this issue:

  • Who is Publishing NSA and CIA Secrets, and Why?
  • The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway"
  • Securing Elections
  • Surveillance and our Insecure Infrastructure

from the May 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-05.mp3
Category:podcast -- posted at: 7:47am MDT

In this issue:

  • The TSA's Selective Laptop Ban
  • WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies
  • Shadow Brokers Releases the Rest of Their NSA Hacking Tools
  • Congress Removes FCC Privacy Protections on Your Internet Usage
  • Incident Response as "Hand-to-Hand Combat"
  • Fourth WikiLeaks CIA Attack Tool Dump
  • Security Orchestration and Incident Response
  • Commenting Policy for My Blog

from the April 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-04.mp3
Category:podcast -- posted at: 4:19am MDT

In this issue:

  • WikiLeaks Releases CIA Hacking Tools
  • Botnets
  • Defense Against Doxing
  • Buzzword Watch: Prosilience
  • The CIA's "Development Tradecraft DOs and DON'Ts"

from the March 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-03.mp3
Category:podcast -- posted at: 3:22am MDT

In this issue:

  • Security and the Internet of Things
  • Security and Privacy Guidelines for the Internet of Things

from the February 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-02.mp3
Category:podcast -- posted at: 2:25am MDT

Crypto-Gram 15 January 2017

In this issue:

  • Attributing the DNC Hacks to Russia
  • Are We Becoming More Moral Faster Than We're Becoming More Dangerous?
  • Security Risks of TSA PreCheck
  • Law Enforcement Access to IoT Data
  • Class Breaks
  • A Comment on the Trump Dossier

from the January 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-17-01.mp3
Category:podcast -- posted at: 1:22am MDT

Crypto-Gram 15 December 2016

In this issue:

  • My Priorities for the Next Four Years
  • Hacking and the 2016 Presidential Election
  • Dumb Security Survey Questions

from the December 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-12.mp3
Category:podcast -- posted at: 12:31am MDT

Crypto-Gram 15 November 2016

In this issue:

  • Election Security
  • Lessons From the Dyn DDoS Attack
  • Regulation of the Internet of Things
  • Virtual Kidnapping
  • Intelligence Oversight and How It Can Fail
  • Whistleblower Investigative Report on NSA Suite B Cryptography

from the November 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-11.mp3
Category:podcast -- posted at: 12:08am MDT

Crypto-Gram 15 October 2016

In this issue:

  • Security Economics of the Internet of Things
  • Cybersecurity Issues for the Next Administration
  • Security Design: Stop Trying to Fix the User
  • Recovering an iPhone 5c Passcode
  • The Hacking of Yahoo

from the October 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-10.mp3
Category:podcast -- posted at: 10:25am MDT

Crypto-Gram 15 September 2016

In this issue:

  • The NSA Is Hoarding Vulnerabilities
  • Someone Is Learning How to Take Down the Internet
  • Organizational Doxing and Disinformation
  • iPhone Zero-Day Used by UAE Government
  • Apple's Cloud Key Vault

from the September 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-09.mp3
Category:podcast -- posted at: 10:03am MDT

Crypto-Gram 15 August 2016

In this issue:

  • The Security of Our Election Systems
  • Hacking the Vote
  • Real-World Security and the Internet of Things
  • Hacking Your Computer Monitor
  • More on the Vulnerabilities Equities Process

from the August 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-08.mp3
Category:podcast -- posted at: 8:22am MDT

Crypto-Gram 15 July 2016

In this issue:

  • CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist
  • Report on the Vulnerabilities Equities Process
  • Apple's Differential Privacy
  • Google's Post-Quantum Cryptography

from the July 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

 

Direct download: crypto-gram-16-07.mp3
Category:podcast -- posted at: 7:19am MDT

Crypto-Gram 15 June 2016

In this issue:

  • The Unfalsifiability of Security Claims
  • Arresting People for Walking Away from Airport Security
  • Suckfly
  • Google Moving Forward on Automatic Logins
  • Security and Human Behavior (SHB 2016)

from the June 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-06.mp3
Category:podcast -- posted at: 6:22am MDT

Crypto-Gram 15 May 2016

In this issue:

  • Credential Stealing as an Attack Vector
  • Helen Nissenbaum on Regulating Data Collection and Use
  • Amazon Unlimited Fraud
  • I'm Writing a Book on Security

from the May 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-05.mp3
Category:podcast -- posted at: 5:17am MDT

Crypto-Gram 15 April 2016

In this issue:

  • Lawful Hacking and Continuing Vulnerabilities
  • More Links on the San Bernardino iPhone Case
  • Cryptography Is Harder Than It Looks
  • Memphis Airport Inadvertently Gets Security Right
  • New NIST Encryption Guidelines
  • Hacking Lottery Machines
  • IRS Security

from the April 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-04.mp3
Category:podcast -- posted at: 4:29am MDT

Crypto-Gram 15 March 2016

In this issue:

  • Data Is a Toxic Asset
  • The FBI vs. Apple: Decrypting an iPhone
  • The Importance of Strong Encryption to Security
  • Security Implications of Cash
  • WikiLeaks Publishes NSA Target List
  • Cheating at Professional Bridge
  • Simultaneous Discovery of Vulnerabilities

from the March 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-03.mp3
Category:podcast -- posted at: 3:31am MDT

Crypto-Gram 15 February 2016

In this issue:

  • The Internet of Things Will Be the World's Biggest Robot
  • Integrity and Availability Threats
  • Security vs. Surveillance
  • Paper on the Going Dark Debate
  • The 2016 National Threat Assessment
  • AT&T Does Not Care about Your Privacy
  • "Data and Goliath" Published in Paperback
  • NSA's TAO Head on Internet Offense and Defense
  • Worldwide Encryption Products Survey

from the February 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-02.mp3
Category:podcast -- posted at: 2:29am MDT

Crypto-Gram 15 January 2016

In this issue:

  • The Internet of Things that Talk About You Behind Your Back
  • Using Law against Technology
  • DMCA and the Internet of Things
  • NSA Spies on Israeli Prime Minister
  • Replacing Judgment with Algorithms
  • IT Security and the Normalization of Deviance

from the January 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-16-01.mp3
Category:podcast -- posted at: 1:21am MDT

Crypto-Gram 15 December 2015

In this issue:

  • Policy Repercussions of the Paris Terrorist Attacks
  • NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
  • Reputation in the Information Age
  • On CISA
  • Voter Surveillance
  • Worldwide Cryptographic Products Survey: Edits and Additions Wanted
  • Security vs. Business Flexibility

from the December 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-12.mp3
Category:podcast -- posted at: 12:21am MDT

Crypto-Gram 15 November 2015

In this issue:

  • The Doxing Trend
  • The Rise of Political Doxing
  • Breaking Diffie-Hellman with Massive Precomputation (Again)
  • Australia Is Testing Virtual Passports
  • The Effects of Surveillance on the Victims

from the November 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-11.mp3
Category:podcast -- posted at: 12:02am MDT

Crypto-Gram 15 October 2015

In this issue:

  • Volkswagen and Cheating Software
  • Living in a Code Yellow World
  • Obama Administration Not Pursuing a Backdoor to Commercial Encryption
  • Stealing Fingerprints
  • Automatic Face Recognition and Surveillance
  • Bringing Frozen Liquids through Airport Security
  • SHA-1 Freestart Collision

from the October 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-10.mp3
Category:podcast -- posted at: 11:05am MDT

Crypto-Gram 15 September 2015

In this issue:

  • The Security Risks of Third-Party Data
  • NSA Plans for a Post-Quantum World
  • Drone Self-Defense and the Law
  • Hacking Team, Computer Vulnerabilities, and the NSA
  • TSA Master Keys
  • Oracle CSO Rant Against Security Experts
  • FBI and Apple's Encryption
  • Animals vs. Drones
  • Glenn Greenwald Debates Keith Alexander
  • Wanted: Cryptography Products for Worldwide Survey

from the September 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-09.mp3
Category:podcast -- posted at: 10:06am MDT

Crypto-Gram 15 August 2015

In this issue:

  • Backdoors Won't Solve Comey's Going Dark Problem
  • Another Salvo in the Second Crypto War (of Words)
  • Cosa Nostra Dead Drops
  • Bizarre High-Tech Kidnapping
  • Fugitive Located by Spotify
  • Intimidating Military Personnel by Targeting Their Families
  • Stagefright Vulnerability in Android Phones

from the August 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-08.mp3
Category:podcast -- posted at: 8:24am MDT

Crypto-Gram 15 July 2015

In this issue:

  • Organizational Doxing
  • Why We Encrypt
  • The Secrecy of the Snowden Documents
  • The Risks of Mandating Backdoors in Encryption Products
  • What is the DoD's Position on Backdoors in Security Systems?
  • Office of Personnel Management Data Hack
  • More about the NSA's XKEYSCORE
  • Hayden Mocks NSA Reforms
  • NSA French and German Intercepts
  • Hacking Team Is Hacked

from the July 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-07.mp3
Category:podcast -- posted at: 8:06am MDT

Crypto-Gram 15 June 2015

In this issue:

  • The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
  • NSA Running a Massive IDS on the Internet Backbone
  • Duqu 2.0
  • Why the Recent Section 215 Reform Debate Doesn't Matter Much
  • TSA Not Detecting Weapons at Security Checkpoints
  • Chris Roberts and Avionics Security
  • Encrypting Windows Hard Drives
  • Should Companies Do Most of Their Computing in the Cloud? (Part 1)
  • Should Companies Do Most of Their Computing in the Cloud? (Part 2)
  • Should Companies Do Most of Their Computing in the Cloud? (Part 3)
  • Eighth Movie-Plot Threat Contest Winner

from the June 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-06.mp3
Category:podcast -- posted at: 6:30am MDT

Crypto-Gram 15 May 2015

In this issue:

  • Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit
  • The Further Democratization of QUANTUM
  • The Further Democratization of Stingray
  • Eighth Movie-Plot Threat Contest Semifinalists
  • Hacking Airplanes
  • Counting the US Intelligence Community Leakers
  • "Hinky" in Action

from the May 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-05.mp3
Category:podcast -- posted at: 5:25am MDT

Crypto-Gram 15 April 2015

In this issue:

  • More "Data and Goliath" News
  • The Eighth Movie-Plot Threat Contest
  • Metal Detectors at Sports Stadiums
  • Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception
  • New Zealand's XKEYSCORE Use
  • Australia Outlaws Warrant Canaries

from the April 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-04.mp3
Category:podcast -- posted at: 5:12am MDT

Crypto-Gram 15 March 2015

In this issue:

  • "Data and Goliath"'s Big Idea
  • "Data and Goliath" News
  • Everyone Wants You To Have Security, But Not from Them
  • The Democratization of Cyberattack
  • The Equation Group's Sophisticated Hacking and Exploitation Tools
  • Ford Proud that "Mustang" Is a Common Password
  • Attack Attribution and Cyber Conflict
  • Co3 Systems Changes Its Name to Resilient Systems
  • FREAK: Security Rollback Attack Against SSL
  • Can the NSA Break Microsoft's BitLocker?
  • Hardware Bit-Flipping Attack

from the March 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-03.mp3
Category:podcast -- posted at: 4:12am MDT

Crypto-Gram 15 February 2015

In this issue:

  • Samsung Television Spies on Viewers
  • Accountability as a Security System
  • When Thinking Machines Break the Law
  • Obama Says Terrorism Is Not an Existential Threat
  • National Academies Report on Bulk Intelligence Collection
  • My Superpower
  • New Book: "Data and Goliath"
  • DEA Also Conducting Mass Telephone Surveillance

from the February 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-02.mp3
Category:podcast -- posted at: 3:05am MDT

Crypto-Gram 15 January 2015

In this issue:

  • Lessons from the Sony Hack
  • Reacting to the Sony Hack
  • Did North Korea Really Attack Sony?
  • Attributing the Sony Attack
  • The Limits of Police Subterfuge
  • Leaked CIA Documents
  • Doxing as an Attack
  • Attack Attribution in Cyberspace
  • The Security of Data Deletion

from the January 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-01.mp3
Category:podcast -- posted at: 2:11am MDT

Crypto-Gram 15 December 2014

In this issue:

  • Regin
  • FBI Agents Pose as Repairmen to Bypass Warrant Process
  • NSA Hacking of Cell Phone Networks
  • Comments on the Sony Hack
  • Over 700 Million People Taking Steps to Avoid NSA Surveillance
  • Corporations Misusing Our Data

from the December 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-12.mp3
Category:podcast -- posted at: 1:12am MDT

Crypto-Gram 15 November 2014

In this issue:

  • Crypto Wars II
  • Hacking Team Documentation
  • The Future of Incident Response
  • How Did the Feds Identity Dread Pirate Roberts?
  • Spritz: A New RC4-Like Stream Cipher
  • NSA Classification ECI = Exceptionally Controlled Information

from the November 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-11.mp3
Category:podcast -- posted at: 12:02am MDT

Crypto-Gram 15 October 2014

In this issue:

  • Data and Goliath Is Finished
  • iPhone Encryption and the Return of the Crypto Wars
  • Fake Cell Phone Towers Across the US
  • FOXACID Operations Manual
  • NSA Has Undercover Operatives in Foreign Companies
  • DEA Creates Fake Facebook Page in Woman's Name

from the October 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-10.mp3
Category:podcast -- posted at: 10:31am MDT

Crypto-Gram 15 September 2014

In this issue:

  • NSA/GCHQ/CSEC Infecting Innocent Computers Worldwide
  • The Security of al Qaeda Encryption Software
  • QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
  • The Concerted Effort to Remove Data Collection Restrictions
  • Cell Phone Kill Switches Mandatory in California
  • Security of Password Managers

from the September 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-09.mp3
Category:podcast -- posted at: 9:30am MDT

In this issue:

  • New Snowden Interview in Wired
  • The US Intelligence Community has a Third Leaker
  • Over a Billion Passwords Stolen?
  • Irrational Fear of Risks Against Our Children

from the August 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-08.mp3
Category:podcast -- posted at: 8:24am MDT

Crypto-Gram 15 July 2014

In this issue:

  • GCHQ Catalog of Exploit Tools
  • NSA Spied on Prominent Muslim Americans
  • Web Activity Used in Court to Portray State of Mind
  • NSA Targets the Privacy-Conscious for Surveillance
  • Co3 Systems Is Hiring
  • Could Keith Alexander's Advice Possibly Be Worth $600K a Month?

from the July 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-07.mp3
Category:podcast -- posted at: 7:27am MDT

Crypto-Gram 15 Jun 2014

In this issue:

  • Disclosing vs. Hoarding Vulnerabilities
  • The NSA is Not Made of Magic
  • GCHQ Intercept Sites in Oman
  • Chinese Hacking of the US
  • The Human Side of Heartbleed
  • TrueCrypt
  • Security and Human Behavior (SHB 2014)
  • Seventh Movie-Plot Threat Contest Winner

from the June 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-06.mp3
Category:podcast -- posted at: 7:09am MDT

Crypto-Gram 15 May 2014

In this issue:

  • Internet Subversion
  • New Al Qaeda Encryption Software
  • Seventh Movie-Plot Threat Contest Semifinalists
  • Espionage vs. Surveillance

from the May 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-05.mp3
Category:podcast -- posted at: 6:08am MDT

In this issue:

  • Heartbleed
  • Seventh Movie-Plot Threat Contest
  • MYSTIC: The NSA's Telephone Call Collection Program
  • The Continuing Public/Private Surveillance Partnership
  • New Book on Data and Power
  • An Open Letter to IBM's Open Letter
  • Ephemeral Apps
  • Details of the Target Credit Card Breach

from the April 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-04.mp3
Category:podcast -- posted at: 5:09am MDT

Crypto-Gram 15 Mar 2014

In this issue:

  • Breaking Up the NSA
  • Computer Network Exploitation vs. Computer Network Attack
  • Metadata = Surveillance
  • Surveillance by Algorithm
  • Who Should Store NSA Surveillance Data
  • The Security of the Fortuna PRNG
  • RCS Spyware and Citizen Lab
  • Choosing Secure Passwords

from the March 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-03.mp3
Category:podcast -- posted at: 4:01am MDT

In this issue:

  • Finding People's Locations Based on Their Activities in Cyberspace
  • The Insecurity of Secret IT Systems
  • Last Month I Briefed Congress on the NSA
  • US Privacy and Civil Liberties Oversight Board (PCLOB) Condemns NSA Mass Surveillance
  • NSA/GCHQ Accused of Hacking Belgian Cryptographer
  • CSEC Surveillance Analysis of IP and User Data

from the February 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-02.mp3
Category:podcast -- posted at: 3:05am MDT

Crypto-Gram 15 Jan 2014

In this issue:

  • How the NSA Threatens National Security
  • NSA Exploit of the Day
  • Tor User Identified by FBI
  • Security Risks of Embedded Systems
  • Schneier News: I've Joined Co3[“Co-Three”] Systems
  • Twitter Users: Please Make Sure You're Following the Right Feed

from the January 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-01.mp3
Category:podcast -- posted at: 2:12am MDT

In this issue:

  • NSA Spying on Online Gaming Worlds
  • NSA Tracks People Using Google Cookies
  • How Antivirus Companies Handle State-Sponsored Malware
  • Surveillance as a Business Model
  • Evading Airport Security
  • The TQP Patent

from the December 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-12.mp3
Category:podcast -- posted at: 1:05am MDT

In this issue:

  • NSA Harvesting Contact Lists
  • NSA Eavesdropping on Google and Yahoo Networks
  • Code Names for NSA Exploit Tools
  • Defending Against Crypto Backdoors
  • Why the Government Should Help Leakers
  • The Trajectories of Government and Corporate Surveillance
  • A Fraying of the Public/Private Surveillance Partnership
  • Book Review: "Cyber War Will Not Take Place"
  • Understanding the Threats in Cyberspace
  • SecureDrop
  • Dry Ice Bombs at LAX
  • The Battle for Power on the Internet

from the November 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-11.mp3
Category:podcast -- posted at: 12:08am MDT

In this issue:

  • How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
  • Why It's Important to Publish the NSA Programs
  • The NSA's New Risk Analysis
  • Reforming the NSA
  • The Limitations of Intelligence
  • Metadata Equals Surveillance
  • Senator Feinstein Admits the NSA Taps the Internet Backbone
  • NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
  • Air Gaps
  • Will Keccak = SHA-3?
  • Google Knows Every Wi-Fi Password in the World
  • Surreptitiously Tampering with Computer Chips

from the October 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-10.mp3
Category:podcast -- posted at: 11:19am MDT

In this issue:

  • Take Back the Internet
  • More on the NSA Commandeering the Internet
  • Detaining David Miranda
  • Government Secrecy and the Generation Gap
  • Conspiracy Theories and the NSA
  • The NSA's Cryptographic Capabilities
  • How to Remain Secure Against the NSA
  • Protecting Against Leakers
  • Our Newfound Fear of Risk
  • Human-Machine Trust Failures
  • Excess Automobile Deaths as a Result of 9/11
  • iPhone Fingerprint Authentication
  • Hacking Consumer Devices
  • Syrian Electronic Army Cyberattacks
  • The Cryptopocalypse
  • Measuring Entropy and its Applications to Encryption

from the September 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-09.mp3
Category:podcast -- posted at: 10:01am MDT

In this issue:

  • The Public/Private Surveillance Partnership
  • The NSA is Commandeering the Internet
  • Restoring Trust in Government and the Internet
  • Book Review: "Rise of the Warrior Cop"
  • Michael Hayden on the Effects of Snowden's Whistleblowing
  • Counterterrorism Mission Creep

from the August 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-08.mp3
Category:podcast -- posted at: 9:11am MDT

In this issue:

  • Blowback from the NSA Surveillance
  • Evidence that the NSA Is Storing Voice Content, Not Just Metadata
  • NSA Secrecy and Personal Privacy
  • Petition the NSA to Subject its Surveillance Program to Public Comment
  • New Details on Skype Eavesdropping
  • Pre-9/11 NSA Thinking
  • How the NSA Eavesdrops on Americans
  • NSA E-Mail Eavesdropping
  • US Offensive Cyberwar Policy
  • Finding Sociopaths on Facebook
  • My Fellowship at the Berkman Center
  • Protecting E-Mail from Eavesdropping
  • Is Cryptography Engineering or Science?
  • Sixth Movie-Plot Threat Contest Winner

from the July 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-07.mp3
Category:podcast -- posted at: 7:30am MDT

In this issue:

  • Government Secrets and the Need for Whistleblowers
  • Prosecuting Snowden
  • Trading Privacy for Convenience
  • Essays Related to NSA Spying Documents
  • The Politics of Security in a Democracy
  • More on Feudal Security
  • Surveillance and the Internet of Things
  • The Problems with CALEA-II
  • Sixth Annual Movie-Plot Threat Semifinalists
  • A Really Good Article on How Easy it Is to Crack Passwords
  • Bluetooth-Controlled Door Lock
  • Security and Human Behavior (SHB 2013)
  • The Cost of Terrorism in Pakistan

from the June 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-06.mp3
Category:podcast -- posted at: 7:27am MDT

In this issue:

  • Refuse to be Terrorized
  • Intelligence Analysis and the Connect-the-Dots Metaphor
  • Transparency and Accountability
  • The Boston Marathon Bomber Manhunt
  • The Public/Private Surveillance Partnership
  • Michael Chertoff on Google Glass

from the May 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-05.mp3
Category:podcast -- posted at: 6:11am MDT

In this issue:

  • Our Internet Surveillance State
  • Sixth Movie-Plot Threat Contest
  • IT for Oppression
  • When Technology Overtakes Security
  • Security Awareness Training
  • What I've Been Thinking About
  • Changes to My Blog

from the April 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-04.mp3
Category:podcast -- posted at: 5:13am MDT

In this issue:

  • Nationalism on the Internet
  • Automobile Data Surveillance and the Future of Black Boxes
  • The Court of Public Opinion
  • More on Chinese Cyberattacks
  • Technologies of Surveillance
  • Phishing Has Gotten *Very* Good
  • Hacking the Papal Election
  • Getting Security Incentives Right
  • All Those Companies that Can't Afford Dedicated Security

from the March 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-13-03.mp3
Category:podcast -- posted at: 4:14am MDT