This is interesting research:
In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics. Specifically, we apply fluid dynamics...
Read more
Friday Squid Blogging: Breeding the Oval Squid
September 30 2022Japanese scientists are trying to breed the oval squid in captivity. As usual, you can also use this squid post to talk about the security stories in the news that...
Read moreSecurity Vulnerabilities in Covert CIA Websites
September 30 2022Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by—at least—China and Iran, and that the blunder caused a...
Read moreDifferences in App Security/Privacy Based on Country
September 29 2022Depending on where you are when you download your Android apps, it might collect more or less data about you.
The apps we downloaded from Google Play also showed...
Read more
Cold War Bugging of Soviet Facilities
September 28 2022Found documents in Poland detail US spying operations against the former Soviet Union.
The file details a number of bugs found at Soviet diplomatic facilities in Washington, D.C., New...
Read more
New Report on IoT Security
September 27 2022The Atlantic Council has published a report on securing the Internet of Things: “Security in the Billions: Toward a Multinational Strategy to Better Secure the IoT Ecosystem.” The...
Read moreLeaking Passwords through the Spellchecker
September 26 2022Sometimes browser spellcheckers leak passwords:
When using major web browsers like Chrome and Edge, your form data is transmitted to Google and Microsoft, respectively, should enhanced spellcheck features be...
Read more
This one has chewed-up tentacles. (Note that this is a different squid than the one that recently washed up on a South African beach.) As usual, you can also use this...
Read more
Recent Comments