Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of...
Read morePrompt Injection Attacks on Large Language Models
March 7 2023This is a good survey on prompt injection attacks on large language models (like ChatGPT).
Abstract: We are currently witnessing dramatic advances in the capabilities of Large Language Models...
Read more
New National Cybersecurity Strategy
March 6 2023Last week, the Biden administration released a new National Cybersecurity Strategy (summary here). There is lots of good commentary out there....
Read moreResearchers are prototyping multi-segment shapeshifter drones, which are “the precursors to flying squid-bots.” As usual, you can also use this squid post to talk about the security stories in the...
Read moreNick Weaver on Regulating Cryptocurrency
March 3 2023Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion:
Regulators, especially regulators in the United...
Read more
Dumb Password Rules
March 2 2023Examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to...
Read moreA reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.
Read moreSide-Channel Attack against CRYSTALS-Kyber
February 28 2023CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.
Researchers have just published a side-channel attack—using...
Read moreBanning TikTok
February 27 2023Congress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea...
Read more
Recent Comments