From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Operation Squid found 1.3 tons of cocaine hidden in frozen fish.
As usual, you can also use this squid post to talk about the security stories in the news thathere...Bruce Schneier From Schneier on Security | March 15, 2024 at 05:08 PM
C++ guru Herb Sutter writes about how we can improve the programming language for better security.
The immediate problem “is” that it’s Too Easy By Default™ totype...Bruce Schneier From Schneier on Security | March 15, 2024 at 07:05 AM
Kasmir Hill has the story:
Modern cars are internet-enabled, allowing access to services like navigation, roadside assistance and car apps that drivers can connect...Bruce Schneier From Schneier on Security | March 14, 2024 at 07:01 AM
The arms race continues, as burglars are learning how to use jammers to disable Wi-Fi security cameras.Bruce Schneier From Schneier on Security | March 13, 2024 at 07:07 AM
Researchers have demonstrated that putting words in ASCII art can cause LLMs—GPT-3.5, GPT-4, Gemini, Claude, and Llama2—to ignore their safety instructions.
Research...Bruce Schneier From Schneier on Security | March 12, 2024 at 07:12 AM
Initial results in using LLMs to unredact text based on the size of the individual-word redaction rectangles.
This feels like something that a specialized ML system...Bruce Schneier From Schneier on Security | March 11, 2024 at 07:01 AM
Newly discovered plant looks like a squid. And it’s super weird:
The plant, which grows to 3 centimetres tall and 2 centimetres wide, emerges to the surface for...Bruce Schneier From Schneier on Security | March 8, 2024 at 05:11 PM
The Ash Center has posted a series of twelve essays stemming from the Second Interdisciplinary Workshop on Reimagining Democracy (IWORD 2023).
Aviv Ovadya, Democracy...Bruce Schneier From Schneier on Security | March 8, 2024 at 01:38 PM
Researchers ran a global prompt hacking competition, and have documented the results in a paper that both gives a lot of good examples and tries to organize a taxonomy...Bruce Schneier From Schneier on Security | March 8, 2024 at 07:06 AM
With the world’s focus turning to misinformation, manipulation, and outright propaganda ahead of the 2024 U.S. presidential election, we know that democracy has...Bruce Schneier From Schneier on Security | March 7, 2024 at 07:00 AM
The Washington Post is reporting on the FBI’s increasing use of push notification data—”push tokens”—to identify people. The police can request this data from companies...Bruce Schneier From Schneier on Security | March 6, 2024 at 07:06 AM
Consumer Reports has analyzed a bunch of popular Internet-connected video doorbells. Their security is terrible.
First, these doorbells expose your home IP address...Bruce Schneier From Schneier on Security | March 5, 2024 at 07:05 AM
Researchers have demonstrated a worm that spreads through prompt injection. Details:
In one instance, the researchers, acting as attackers, wrote an email including...Bruce Schneier From Schneier on Security | March 4, 2024 at 07:01 AM
Paleontologists have discovered a 183-million-year-old species of vampire squid.
Prior research suggests that the vampyromorph lived in the shallows off an island...Bruce Schneier From Schneier on Security | March 1, 2024 at 05:05 PM
NIST has released version 2.0 of the Cybersecurity Framework:
The CSF 2.0, which supports implementation of the National Cybersecurity Strategy, has an expanded...Bruce Schneier From Schneier on Security | March 1, 2024 at 07:08 AM
In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would...Bruce Schneier From Schneier on Security | February 28, 2024 at 07:02 AM
Last week, someone posted something like 570 files, images and chat logs from a Chinese company called I-Soon. I-Soon sells hacking and espionage services to Chinese...Bruce Schneier From Schneier on Security | February 27, 2024 at 07:03 AM
Apple announced PQ3, its post-quantum encryption standard based on the Kyber secure key-encapsulation protocol, one of the post-quantum algorithms selected by NIST...Bruce Schneier From Schneier on Security | February 26, 2024 at 07:04 AM
There are correlations between the populations of the Illex Argentines squid and water temperatures.
As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | February 23, 2024 at 05:04 PM