New National Cybersecurity Strategy
March 6 2023Last week, the Biden administration released a new National Cybersecurity Strategy (summary here). There is lots of good commentary out there....
Read moreLast week, the Biden administration released a new National Cybersecurity Strategy (summary here). There is lots of good commentary out there....
Read moreResearchers are prototyping multi-segment shapeshifter drones, which are “the precursors to flying squid-bots.” As usual, you can also use this squid post to talk about the security stories in the...
Read moreNicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion:
Regulators, especially regulators in the United...
Read more
Examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to...
Read moreA reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.
Read moreCRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.
Researchers have just published a side-channel attack—using...
Read moreCongress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea...
Read moreThis video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also use this squid post to talk about the security...
Read moreThis is really interesting research from a few months ago:
Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task...
Read more
Recent Comments