New research is able to recover sound waves in a room by observing minute changes in the room's light bulbs. This technique works from a distance, even from a...
Read moreExamining the US Cyber Budget
June 15 2020Jason Healey takes a detailed look at the US federal cybersecurity budget and reaches an important conclusion: the US keeps saying that we need to prioritize defense, but in...
Read moreI think we need more human organs with squid-like features. As usual, you can also use this squid post to talk about the security stories in the news that...
Read moreFacebook Helped Develop a Tails Exploit
June 12 2020This is a weird story: Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of...
Read moreAnother Intel Speculative Execution Vulnerability
June 11 2020Remember Spectre and Meltdown? Back in early 2018, I wrote: Spectre and Meltdown are pretty catastrophic vulnerabilities, but they only affect the confidentiality of data. Now that they --...
Read moreAvailability Attacks against Neural Networks
June 10 2020New research on using specially crafted inputs to slow down machine-learning neural network systems: Sponge Examples: Energy-Latency Attacks on Neural Networks shows how to find adversarial examples that cause...
Read moreNew research: "Security Analysis of the Democracy Live Online Voting System": Abstract: Democracy Live's OmniBallot platform is a web-based system for blank ballot delivery, ballot marking, and (optionally) online...
Read moreGoogle's threat analysts have identified state-level attacks from China. I hope both campaigns are working under the assumption that everything they say and do will be dumped on the...
Read more
Recent Comments