Yet another SQUID acronym: SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how...
Read morePeople-Search Site Removal Services Largely Ineffective
August 9 2024Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work:
As a whole, people-search removal services are largely ineffective. Private information about...
Read more
Problems with Georgia’s Voter Registration Portal
August 7 2024It’s possible to cancel other people’s voter registrations:
On Friday, four days after Georgia Democrats began warning that bad actors could abuse the state’s new online portal for...
Read more
On the Cyber Safety Review Board
August 6 2024When an airplane crashes, impartial investigatory bodies leap into action, empowered by law to unearth what happened and why. But there is no such empowered and impartial body to...
Read moreNew Patent Application for Car-to-Car Surveillance
August 5 2024Ford has a new patent application for a system where cars monitor each other’s speeds, and then report then to some central authority. Slashdot thread.
Read moreFriday Squid Blogging: Treating Squid Parasites
August 3 2024A newly discovered parasite that attacks squid eggs has been treated. Blog moderation policy.
Read moreLeaked GitHub Python Token
August 2 2024Here’s a disaster that didn’t happen:
Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container hosted on Docker Hub, which granted elevated...
Read more
Education in Secure Software Development
August 1 2024The Linux Foundation and OpenSSF released a report on the state of education in secure software development.
…many developers lack the essential knowledge and skills to effectively implement secure...
Read more
Nearly 7% of Internet Traffic Is Malicious
July 31 2024Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes after proof-of-concepts...
Read moreProviding Security Updates to Automobile Software
July 30 2024Auto manufacturers are just starting to realize the problems of supporting the software in older models:
Today’s phones are able to receive updates six to eight years after their...
Read more
Recent Comments