Source: www.schneier.com – Author: Bruce Schneier Open-Source LLMs In February, Meta released its large language model: LLaMA. Unlike OpenAI and its ChatGPT, Meta didn’t just give...
Author:
Open-Source LLMs – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier In February, Meta released its large language model: LLaMA. Unlike OpenAI and its ChatGPT, Meta didn’t just give the world...
On the Catastrophic Risk of AI – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Earlier this week, I signed on to a short group statement, coordinated by the Center for AI Safety: Mitigating the...
Chinese Hacking of US Critical Infrastructure – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Chinese Hacking of US Critical Infrastructure Everyone is writing about an interagency and international report on Chinese hacking of...
Brute-Forcing a Fingerprint Reader – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier It’s neither hard nor expensive: Unlike password authentication, which requires a direct match between what is inputted and what’s stored...
Friday Squid Blogging: Online Cephalopod Course – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Friday Squid Blogging: Online Cephalopod Course Atlas Obscura has a five-part online course on cephalopods, taught by squid biologist...
Expeditionary Cyberspace Operations – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that...
Expeditionary Cyberspace Operations – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that...
On the Poisoning of LLMs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given that we’ve known about model poisoning for years, and given...
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws It’s been a big month for US data privacy. Indiana, Iowa,...
Credible Handwriting Machine – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier In case you don’t have enough to worry about, someone has built a credible handwriting machine: This is still a...
Google Is Not Deleting Old YouTube Videos – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Google Is Not Deleting Old YouTube Videos Google has backtracked on its plan to delete inactive YouTube videos—at least...
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports...
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports...
Security Risks of New .zip and .mov Domains – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Hauke • May 19, 2023 8:11 AM I may be dating myself here, but I don’t remember a...
Microsoft Secure Boot Bug – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure...
Micro-Star International Signing Key Stolen – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Micro-Star International—aka MSI—had its UEFI signing key stolen last month. This raises the possibility that the leaked key could push...
Friday Squid Blogging: Giant Squid Video – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments MarkH • May 13, 2023 12:45 AM While reading a news story, my attention was caught by these...
Ted Chiang on the Risks of AI – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Ted Chiang has an excellent essay in the New Yorker: “Will A.I. Become the New McKinsey?” The question we should...
Ted Chiang on the Risks of AI – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier Ted Chiang has an excellent essay in the New Yorker: “Will A.I. Become the New McKinsey?” The question we should...
Building Trustworthy AI – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Building Trustworthy AI We will all soon get into the habit of using AI tools for help with everyday problems...
FBI Disables Russian Malware – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Reuters is reporting that the FBI “had identified and disabled malware wielded by Russia’s FSB security service against an undisclosed...
PIPEDREAM Malware against Industrial Control Systems – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Another nation-state malware, Russian in origin: In the early stages of the war in Ukraine in 2022, PIPEDREAM, a known...
AI Hacking Village at DEF CON This Year – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog AI Hacking Village at DEF CON This Year At DEF CON this year, Anthropic, Google, Hugging Face, Microsoft, NVIDIA,...
Friday Squid Blogging: “Mediterranean Beef Squid” Hoax – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Friday Squid Blogging: “Mediterranean Beef Squid” Hoax The viral video of the “Mediterranean beef squid”is a hoax. It’s not...
Large Language Models and Elections – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Earlier this week, the Republican National Committee released a video that it claims was “built entirely with AI imagery.” The...
SolarWinds Detected Six Months Earlier – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier New reporting from Wired reveals that the Department of Justice detected the SolarWinds attack six months before Mandient detected it...
NIST Draft Document on Post-Quantum Cryptography Guidance – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog NIST Draft Document on Post-Quantum Cryptography Guidance NIST has release a draft of Special Publication1800-38A: Migration to Post-Quantum Cryptography:...
Friday Squid Blogging: More Squid Camouflage Research – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier vas pup • April 28, 2023 5:29 PM I am sorry if Bruce already pointed all bloggers attention to it...
Hacking the Layoff Process – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier My latest book, A Hacker’s Mind, is filled with stories about the rich and powerful hacking systems, but it was...