The privilege escalation flaw is one in thousands that researchers have disclosed in recent years.
Read moreFriday Squid Blogging: Giant Squid Video
May 13 2023A video—authentic, not a deep fake—of a giant squid close to the surface. As usual, you can also use this squid post to talk about the security stories in the...
Read moreThe deal will enhance the capabilities of both companies and provide customers with a more comprehensive way to protect their digital assets.
Read moreMaking Sure Lost Data Stays Lost
May 13 2023Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
Read moreDubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies.
Read moreThe Technology Innovation Institute’s year-long cryptographic challenge invites participants to assess concrete hardness of McEliece public-key encryption scheme.
Read moreNot just an active adversary, but a two-faced one, too.
Read moreOne long-awaited security move caused a ripple effect in the cybercrime ecosystem.
Read moreTed Chiang on the Risks of AI
May 12 2023Ted Chiang has an excellent essay in the New Yorker: “Will A.I. Become the New McKinsey?”
The question we should be asking is: as A.I. becomes more powerful and...
Read more
Regulators should apply a healthy skepticism to generative AI developments to guarantee a competitive marketplace.
Read more
Recent Comments