Seems like an old system system that predates any care about security: The flaw has to do with the protocol used in a train system known as the End-of-Train and Head-of-Train. A Flashing Rear End Device (FRED), also known as an End-of-Train (EOT) device, is attached to the back of a train and sends data … Read More “Hacking Trains” »
Category: Security technology
Auto Added by WPeMatico
The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here. Powered by WPeMatico
New research: One reason the early years of squids has been such a mystery is because squids’ lack of hard shells made their fossils hard to come by. Undeterred, the team instead focused on finding ancient squid beaks—hard mouthparts with high fossilization potential that could help the team figure out how squids evolved. With that … Read More “Squid Dominated the Oceans in the Late Cretaceous” »
Long article on the difficulty (impossibility?) of human spying in the age of ubiquitous digital surveillance. Powered by WPeMatico
Good tutorial by Micah Lee. It includes some nonobvious use cases. Powered by WPeMatico
This time it’s the Swedish prime minister’s bodyguards. (Last year, it was the US Secret Service and Emmanuel Macron’s bodyguards. in 2018, it was secret US military bases.) This is ridiculous. Why do people continue to make their data public? Powered by WPeMatico
Academic papers were found to contain hidden instructions to LLMs: It discovered such prompts in 17 articles, whose lead authors are affiliated with 14 institutions including Japan’s Waseda University, South Korea’s KAIST, China’s Peking University and the National University of Singapore, as well as the University of Washington and Columbia University in the U.S. Most … Read More “Hiding Prompt Injections in Academic Papers” »
New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. Powered by WPeMatico
Once you build a surveillance system, you can’t control who will use it: A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone records and use Mexico City’s surveillance cameras to help track and kill the agency’s informants in 2018, according to a new US justice department report. The … Read More “Surveillance Used by a Drug Cartel” »
A whole class of speculative execution attacks against CPUs were published in 2018. They seemed pretty catastrophic at the time. But the fixes were as well. Speculative execution was a way to speed up CPUs, and removing those enhancements resulted in significant performance drops. Now, people are rethinking the trade-off. Ubuntu has disabled some protections, … Read More “Ubuntu Disables Spectre/Meltdown Protections” »