No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don’t know how, or when. While the literature generally focuses on the different uses of AI by attackers and defenders and the resultant arms race between the two I want to talk about software vulnerabilities. All software … Read More “Machine Learning to Detect Software Vulnerabilities” »
Category: Security technology
Auto Added by WPeMatico
This is clever: How the attack works: Attacker added tens of malicious servers to the Electrum wallet network. Users of legitimate Electrum wallets initiate a Bitcoin transaction. If the transaction reaches one of the malicious servers, these servers reply with an error message that urges users to download a wallet app update from a malicious … Read More “New Attack Against Electrum Bitcoin Wallets” »
It’s growing. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
Nice interview with the EFF’s director of cybersecurity, Eva Gaperon. Powered by WPeMatico
Good article on using long-range familial searching — basically, DNA matching of distant relatives — as a police forensics tool. Powered by WPeMatico
Wired has an excellent article on China’s APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers’ networks. I am reminded of the NSA’s “I Hunt Sysadmins” presentation, published by the Intercept. Powered by WPeMatico
This is almost over: From 1 December 2018 — 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will be offering affordable full-course menus based on Adriatic squid, combined with quality local olive oil and fine wines. As usual, you can also use this squid post to … Read More “Friday Squid Blogging: Squid-Focused Menus in Croatia” »
Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are: HADQSSFC98WCQ LDLMC6AJLBDJY YWSY8CXYMQNJ6 JWM7SGNUXX7DB UPKAJ6MHB2LEF M85YN36UR926H 9ULE4NFAH2SLF GU7A79GSDCXAT 9K8Q4RX6DKL84 M92GB246XY7JN Congratulations to the first ten people to try to use them. Powered by WPeMatico
This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced “eve”) used their large reservoir of trusted IP addresses to conceal a fraud that otherwise would have been easy for advertisers to detect. The scheme employed a thousand servers hosted inside data … Read More “Massive Ad Fraud Scheme Relied on BGP Hijacking” »
The New York Times is reporting on the security measures people are using to protect nativity displays. Powered by WPeMatico
