Hacking Trains
July 17 2025Seems like an old system system that predates any care about security:
The flaw has to do with the protocol used in a train system known as the End-of-Train...
Read more
Seems like an old system system that predates any care about security:
The flaw has to do with the protocol used in a train system known as the End-of-Train...
Read more
The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.
Read moreNew research:
One reason the early years of squids has been such a mystery is because squids’ lack of hard shells made their fossils hard to come by. Undeterred,...
Read more
Long article on the difficulty (impossibility?) of human spying in the age of ubiquitous digital surveillance.
Read moreGood tutorial by Micah Lee. It includes some nonobvious use cases.
Read moreThis time it’s the Swedish prime minister’s bodyguards. (Last year, it was the US Secret Service and Emmanuel Macron’s bodyguards. in 2018, it was secret US military bases.) This is...
Read moreAcademic papers were found to contain hidden instructions to LLMs:
It discovered such prompts in 17 articles, whose lead authors are affiliated with 14 institutions including Japan’s Waseda University,...
Read more
New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
Read moreOnce you build a surveillance system, you can’t control who will use it:
A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone...
Read more
Recent Comments