<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[A Taxonomy of Cognitive Security - Schneier on Security]]></title><description><![CDATA[<p>A Taxonomy of Cognitive Security - Schneier on Security</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.schneier.com/blog/archives/2026/04/a-taxonomy-of-cognitive-security.html" title="A Taxonomy of Cognitive Security - Schneier on Security">
<img src="https://www.schneier.com/wp-content/uploads/2019/10/rss-32px.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>





















<div class="card-body">
<h5 class="card-title">
<a href="https://www.schneier.com/blog/archives/2026/04/a-taxonomy-of-cognitive-security.html">
A Taxonomy of Cognitive Security - Schneier on Security
</a>
</h5>
<p class="card-text line-clamp-3">Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but—even better—Menton has a long essay laying out the basic concepts and ideas. The whole thing is important and well worth reading, and I hesitate to excerpt. Here’s a taste: The NeuroCompiler is where raw sensory data gets interpreted before you’re consciously aware of it. It decides what things mean, and it does this fast, automatic, and mostly invisible. It’s also where the majority of cognitive exploits actually land, right in this sweet spot between perception and conscious thought...</p>
</div>
<a href="https://www.schneier.com/blog/archives/2026/04/a-taxonomy-of-cognitive-security.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.schneier.com/wp-content/uploads/2020/06/cropped-favicon-1-32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />







<p class="d-inline-block text-truncate mb-0">Schneier on Security <span class="text-secondary">(www.schneier.com)</span></p>
</a>
</div></p><p>Short summary: <a href="https://hackerworkspace.com/article/a-taxonomy-of-cognitive-security-schneier-on-security" rel="nofollow noopener"><span>https://</span><span>hackerworkspace.com/article/a-</span><span>taxonomy-of-cognitive-security-schneier-on-security</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerability" rel="tag">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/exploit" rel="tag">#<span>exploit</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/017fa1fb-dd02-431f-b401-47cf2d0be02d/a-taxonomy-of-cognitive-security-schneier-on-security</link><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 01:39:26 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/017fa1fb-dd02-431f-b401-47cf2d0be02d.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 01 Apr 2026 17:11:38 GMT</pubDate><ttl>60</ttl></channel></rss>