Skip to content
SSL and internet security news

Informations about SSL certificates and networks security

Category: artificial intelligence

Auto Added by WPeMatico

Ten Ways AI Will Change Democracy

Posted on November 13, 2023 By infossl
artificial intelligence, laws, LLM, Security technology, Uncategorized

Artificial intelligence will change so many aspects of society, largely in ways that we cannot conceive of yet. Democracy, and the systems of governance that surround it, will be no exception. In this short essay, I want to move beyond the “AI-generated disinformation” trope and speculate on some of the ways AI will change how … Read More “Ten Ways AI Will Change Democracy” »

Microsoft is Soft-Launching Security Copilot

Posted on October 25, 2023 By infossl
artificial intelligence, computer security, incident response, LLM, microsoft, security analysis, Security technology, Uncategorized

Microsoft has announced an early access program for its LLM-based security chatbot assistant: Security Copilot. I am curious whether this thing is actually useful. Powered by WPeMatico

AI and US Election Rules

Posted on October 20, 2023 By infossl
artificial intelligence, deep fake, essays, laws, Security technology, Uncategorized, voting

If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question being taken up by the Federal Election Commission this month, and public input is needed to curtail the potential for AI to take US campaigns (even more) off the rails. At issue is whether candidates … Read More “AI and US Election Rules” »

AI Risks

Posted on October 9, 2023 By infossl
artificial intelligence, essays, national security policy, regulation, Security technology, Uncategorized

There is no shortage of researchers and industry titans willing to warn us about the potential destructive power of artificial intelligence. Reading the headlines, one would hope that the rapid gains in AI technology have also brought forth a unifying realization of the risks—and the steps we need to take to mitigate them. The reality, … Read More “AI Risks” »

Deepfake Election Interference in Slovakia

Posted on October 6, 2023 By infossl
artificial intelligence, deep fake, Security technology, Uncategorized, voting

Well designed and well timed deepfake or two Slovakian politicians discussing how to rig the election: Šimečka and Denník N immediately denounced the audio as fake. The fact-checking department of news agency AFP said the audio showed signs of being manipulated using AI. But the recording was posted during a 48-hour moratorium ahead of the … Read More “Deepfake Election Interference in Slovakia” »

Political Disinformation and AI

Posted on October 5, 2023 By infossl
artificial intelligence, ChatGPT, disinformation, essays, propaganda, Security technology, social media, Uncategorized, voting

Elections around the world are facing an evolving threat from foreign actors, one that involves artificial intelligence. Countries trying to influence each other’s elections entered a new era in 2016, when the Russians launched a series of social media disinformation campaigns targeting the US presidential election. Over the next seven years, a number of countries—most … Read More “Political Disinformation and AI” »

Malicious Ads in Bing Chat

Posted on October 4, 2023 By infossl
artificial intelligence, malware, marketing, Security technology, Uncategorized

Malicious ads are creeping into chatbots. Powered by WPeMatico

NSA AI Security Center

Posted on October 2, 2023 By infossl
artificial intelligence, cybersecurity, national security policy, nsa, Security technology, Uncategorized

The NSA is starting a new artificial intelligence security center: The AI security center’s establishment follows an NSA study that identified securing AI models from theft and sabotage as a major national security challenge, especially as generative AI technologies emerge with immense transformative potential for both good and evil. Nakasone said it would become “NSA’s … Read More “NSA AI Security Center” »

Detecting AI-Generated Text

Posted on September 19, 2023 By infossl
artificial intelligence, LLM, Security technology, Uncategorized

There are no reliable ways to distinguish text written by a human from text written by an large language model. OpenAI writes: Do AI detectors work? In short, no. While some (including OpenAI) have released tools that purport to detect AI-generated content, none of these have proven to reliably distinguish between AI-generated and human-generated content. … Read More “Detecting AI-Generated Text” »

LLM Summary of My Book Beyond Fear

Posted on September 15, 2023 By infossl
artificial intelligence, Beyond Fear, books, LLM, Security technology, Uncategorized

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. I’m particularly interested in a taxonomy of his ethical arguments—please expand on that. Then lay out the most salient criticisms of the book. Claude’s reply: Here’s a brief summary of the key themes and arguments made … Read More “LLM Summary of My Book Beyond Fear” »

Posts pagination

Previous 1 … 4 5 6 … 10 Next
fr_FR

Recent Posts

  • Friday Squid Blogging: Japanese Divers Video Giant Squid
  • Chinese AI Submersible
  • Fake Student Fraud in Community Colleges
  • Another Move in the Deepfake Creation/Detection Arms Race
  • Friday Squid Blogging: Pyjama Squid

Tags

academicpapers airgaps android anonymity authentication borders cars cellphones censorship control courts crime cryptanalysis cryptography cryptowars deanonymization edwardsnowden encryption fbi fear geolocation guardian hacking intelligence ios jamming keyescrow lies malware medicine nationalsecuritypolicy nsa pointofsale printers privacy rc4 retail secrecy sidechannelattacks socialmedia squid surveillance tracking tradecraft whistleblowers

Categories

  • 3dprinters
  • 911
  • A Hacker's Mind
  • academic
  • academic papers
  • academicpapers
  • accountability
  • aclu
  • activism
  • adobe
  • advanced persistent threats
  • advancedpersistentthreats
  • adware
  • aes
  • AI
  • air travel
  • airgaps
  • airtravel
  • al Qaeda
  • alarms
  • algorithms
  • alqaeda
  • amazon
  • android
  • anonymity
  • Anonymous
  • antivirus
  • apache
  • apple
  • Applied Cryptography
  • appliedcryptography
  • artificial intelligence
  • artificialintelligence
  • assassinations
  • atms
  • att
  • attribution
  • audio
  • auditing
  • australia
  • authentication
  • authorization
  • automation
  • backdoors
  • backups
  • banking
  • baserate
  • behavioraldetection
  • Beyond Fear
  • beyondfear
  • bgp
  • biological warfare
  • biologicalwarfare
  • biometrics
  • bios
  • bitcoin
  • BitLocker
  • blackberry
  • blackmail
  • blockchain
  • bluetooth
  • bombs
  • books
  • borders
  • botnets
  • brazil
  • breaches
  • bribes
  • browsers
  • business of security
  • businessofsecurity
  • CALEA
  • cameras
  • camouflage
  • canada
  • captchas
  • cars
  • casinos
  • cell phones
  • cellphones
  • censorship
  • certificates
  • certifications
  • ch2ke
  • chatbots
  • ChatGPT
  • cheating
  • chelseamanning
  • chess
  • child pornography
  • childpornography
  • children
  • china
  • chipandpin
  • chrome
  • Chrome OS
  • cia
  • cisco
  • Citizen Lab
  • citizenlab
  • cloning
  • cloud computing
  • cloudcomputing
  • co3systems
  • coastguard
  • colombia
  • complexity
  • compliance
  • computer security
  • computersecurity
  • concealment
  • conferences
  • cons
  • consumerization
  • contests
  • control
  • cookies
  • cooperation
  • copyright
  • costbenefitanalysis
  • courts
  • cover-ups
  • coverups
  • COVID-19
  • covid19
  • cracking
  • credentials
  • credit cards
  • creditcards
  • crime
  • cross-site scripting
  • crowdsourcing
  • cryptanalysis
  • crypto wars
  • cryptocurrency
  • cryptography
  • cryptome
  • cryptowars
  • cuba
  • cyberattack
  • cybercrime
  • cyberespionage
  • cybersecurity
  • cyberterrorism
  • cyberwar
  • cyberweapons
  • dark web
  • darkweb
  • darpa
  • Data and Goliath
  • data breaches
  • data collection
  • data destruction
  • data loss
  • data mining
  • data privacy
  • data protection
  • dataandgoliath
  • databases
  • databreaches
  • datacollection
  • datadestruction
  • dataloss
  • datamining
  • dataprotection
  • dataretention
  • de-anonymization
  • dea
  • deaddrops
  • deanonymization
  • debates
  • deception
  • deep fake
  • deepfake
  • defense
  • democracy
  • deniability
  • denial of service
  • denialofservice
  • Department of Defense
  • departmentofdefense
  • dhs
  • disclosure
  • disguise
  • disinformation
  • dmca
  • dna
  • dns
  • doghouse
  • domain names
  • doxing
  • drm
  • drones
  • drug trade
  • drugtrade
  • e-mail
  • eavesdropping
  • ebay
  • ebooks
  • economics of security
  • economicsofsecurity
  • Edward Snowden
  • edwardsnowden
  • eff
  • egypt
  • email
  • embedded systems
  • embeddedsystems
  • employment
  • encryption
  • enigma
  • EPIC
  • epidemiology
  • espionage
  • essays
  • estonia
  • ethics
  • eu
  • EULA
  • exploits
  • externalities
  • extortion
  • face recognition
  • facebook
  • facerecognition
  • fake news
  • fakenews
  • false positives
  • falsenegatives
  • falsepositives
  • fbi
  • fear
  • feudalsecurity
  • filesharing
  • filtering
  • finance
  • fingerprints
  • firefox
  • firewall
  • firmware
  • fisa
  • foia
  • forensics
  • forgery
  • Fortuna
  • france
  • fraud
  • fsecure
  • ftc
  • g7
  • gambling
  • game theory
  • games
  • gametheory
  • gaming consoles
  • gchq
  • gdpr
  • generations
  • geolocation
  • Georgia
  • germany
  • gmail
  • google
  • googleglass
  • gps
  • Greece
  • Guardian
  • guns
  • hackback
  • hacking
  • hardware
  • hashes
  • healthcare
  • Hezbollah
  • history of computing
  • history of cryptography
  • history of security
  • historyofcomputing
  • historyofcryptography
  • historyofsecurity
  • hoaxes
  • homelandsecurity
  • homomorphic encryption
  • hotels
  • hp
  • https
  • human rights
  • humor
  • ibm
  • ics
  • idcards
  • identification
  • identity theft
  • identitytheft
  • impersonation
  • implants
  • incentives
  • incident response
  • incidentresponse
  • india
  • infrastructure
  • inrupt
  • insiders
  • insurance
  • intel
  • intelligence
  • internet
  • Internet and society
  • Internet of Things
  • internetandsociety
  • internetexplorer
  • internetofthings
  • interviews
  • intrusion detection
  • ios
  • iphone
  • iran
  • iraq
  • ireland
  • irs
  • isis
  • isps
  • israel
  • italy
  • jamming
  • japan
  • Juniper
  • kaspersky
  • kazakhstan
  • key logging
  • keyescrow
  • keylogging
  • keys
  • kidnapping
  • killswitch
  • law enforcement
  • lawenforcement
  • laws
  • leaks
  • lebanon
  • lenovo
  • Liars and Outliers
  • liarsandoutliers
  • lies
  • linkedin
  • linux
  • LLM
  • locks
  • loopholes
  • lotteries
  • machine learning
  • machinelearning
  • mail
  • malware
  • man-in-the-middle attacks
  • maninthemiddleattacks
  • marketing
  • mcafee
  • md5
  • medicine
  • Meta
  • metadata
  • microsoft
  • military
  • mitigation
  • monoculture
  • movieplotthreats
  • mozilla
  • music
  • national security policy
  • nationalism
  • nationalsecurityletters
  • nationalsecuritypolicy
  • natural security
  • naturalsecurity
  • networksecurity
  • New York Times
  • Nigeria
  • nist
  • no-fly list
  • Non classé
  • noncomputer hacks
  • North Korea
  • northkorea
  • norway
  • nsa
  • obscurity
  • onetimepads
  • open source
  • opensource
  • operating systems
  • operatingsystems
  • operational security
  • operationalsecurity
  • overreactions
  • pakistan
  • Password Safe
  • passwords
  • passwordsafe
  • patching
  • patents
  • patriotact
  • paypal
  • penetration testing
  • penetrationtesting
  • pgp
  • phishing
  • phones
  • photos
  • physical security
  • physicalsecurity
  • pins
  • plagiarism
  • point of sale
  • pointofsale
  • police
  • policy
  • pornography
  • power
  • press
  • printers
  • prison escapes
  • prisons
  • privacy
  • privilege escalation
  • programming
  • propaganda
  • protocols
  • proxies
  • pseudonymity
  • psychology of security
  • psychologyofsecurity
  • public interest
  • public transit
  • publicinterest
  • publictransit
  • qatar
  • QR codes
  • quantum computing
  • quantum cryptography
  • quantumcomputing
  • quantumcryptography
  • radio
  • random numbers
  • randomnumbers
  • ransomware
  • redaction
  • regulation
  • replayattacks
  • reports
  • reputation
  • resilience
  • Resilient Systems
  • resilientsystems
  • restaurants
  • retail
  • reverse engineering
  • reverseengineering
  • rfid
  • risk assessment
  • riskassessment
  • risks
  • robbery
  • robotics
  • rootkits
  • rsa
  • russia
  • sabotage
  • Safari
  • safes
  • samsung
  • saudiarabia
  • scada
  • scams
  • scanners
  • Schneier news
  • Schneier on Security (book)
  • schneiernews
  • schneierslaw
  • schools
  • sciencefiction
  • search engines
  • searches
  • secrecy
  • secretsharing
  • security analysis
  • security conferences
  • security education
  • security engineering
  • security standards
  • Security technology
  • security theater
  • security tokens
  • securityanalysis
  • securityawareness
  • securityconferences
  • securityeducation
  • securityengineering
  • securitymindset
  • securitymonitoring
  • securitypolicies
  • securityquestions
  • securitystandards
  • securitytheater
  • securitytokens
  • sensors
  • sha1
  • side-channel attacks
  • sidechannelattacks
  • signal
  • signatures
  • SIM cards
  • simcards
  • skimmers
  • skype
  • smart cards
  • smartcards
  • smartphones
  • sms
  • smuggling
  • snake oil
  • snakeoil
  • social engineering
  • social media
  • socialengineering
  • socialmedia
  • societalsecurity
  • software
  • software liability
  • softwareliability
  • sony
  • southkorea
  • spain
  • spam
  • spoofing
  • sports
  • spyware
  • SQL injection
  • sqlinjection
  • squid
  • ss7
  • ssh
  • ssl
  • stalking
  • steganography
  • stuxnet
  • supply chain
  • supplychain
  • surveillance
  • sweden
  • switzerland
  • symantec
  • syria
  • T-Mobile
  • Taiwan
  • tamper detection
  • tamperdetection
  • taxonomies
  • TED
  • telecom
  • telegram
  • television
  • tempest
  • terms of service
  • termsofservice
  • terrorism
  • Thailand
  • theft
  • threat models
  • threatalerts
  • threatmodels
  • tls
  • tor
  • torrents
  • torture
  • tpm
  • tracing
  • tracking
  • tradecraft
  • traffic analysis
  • trafficanalysis
  • transparency
  • transportation
  • treaties
  • trust
  • tsa
  • turkey
  • twitter
  • two-factor authentication
  • twofactorauthentication
  • twofish
  • uae
  • uber
  • uk
  • ukraine
  • un
  • Uncategorized
  • undercover
  • unitedarabemirates
  • usability
  • usb
  • usps
  • utilities
  • uzbekistan
  • verisign
  • verizon
  • video
  • videoconferencing
  • videos
  • violence
  • voice recognition
  • voicerecognition
  • voip
  • voting
  • vpn
  • vulnerabilities
  • war
  • war on the unexpected
  • warontheunexpected
  • watchlists
  • weapons
  • web
  • web privacy
  • webprivacy
  • whatsapp
  • whistleblowers
  • Wi-Fi
  • wifi
  • wikileaks
  • windows
  • wireless
  • yahoo
  • zero-day
  • zeroday

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014

Copyright © 2025 SSL and internet security news.

Theme: Oceanly by ScriptsTown