The Future of Machine Learning and Cybersecurity
June 21 2021
The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line:
The report offers four conclusions:
- Machine learning can... Read more
Fantastic video of a giant squid hunting at depths between 1,827 and 3,117 feet. This is a follow-on from this post. As usual, you can also use this squid post to...
Read morePeloton Vulnerability Found and Fixed
June 18 2021Researchers have discovered a vulnerability in Peloton stationary bicycles, one that would give the attacker complete control over the device. The attack requires physical access to the Peloton, so it’s...
Read moreIntentional Flaw in GPRS Encryption Algorithm GEA-1
June 17 2021
General Packet Radio Service (GPRS) is a mobile data standard that was widely used in the early 2000s. The first encryption algorithm for that standard was GEA-1, a stream...
Read morePaul van Oorschot’s webpage contains a complete copy of his book: Computer Security and the Internet: Tools and Jewels. It’s worth reading.
Read moreVPNs and Trust
June 16 2021
TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country they are incorporated in,...
Read moreAndrew Appel on New Hampshire’s Election Audit
June 15 2021
Really interesting two part analysis of the audit conducted after the 2020 election in Windham, New Hampshire.
Based on preliminary reports published by the team of experts that...
Read more
Recent Comments