Skip to content
SSL and internet security news

Informations about SSL certificates and networks security

Category: Uncategorized

Auto Added by WPeMatico

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

Posted on August 9, 2024 By infossl
artificial intelligence, Security technology, squid, Uncategorized

Yet another SQUID acronym: SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how AI models analyze the genome. Compared with other analysis tools, SQUID is more consistent, reduces background noise, and can lead to more accurate predictions about … Read More “Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI” »

People-Search Site Removal Services Largely Ineffective

Posted on August 9, 2024 By infossl
privacy, reports, searches, Security technology, Uncategorized

Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are largely ineffective. Private information about each participant on the people-search sites decreased after using the people-search removal services. And, not surprisingly, the removal services did save time compared with manually opting … Read More “People-Search Site Removal Services Largely Ineffective” »

Problems with Georgia’s Voter Registration Portal

Posted on August 7, 2024 By infossl
fraud, Georgia, identification, national security policy, Security technology, Uncategorized, voting

It’s possible to cancel other people’s voter registration: On Friday, four days after Georgia Democrats began warning that bad actors could abuse the state’s new online portal for canceling voter registrations, the Secretary of State’s Office acknowledged to ProPublica that it had identified multiple such attempts… …the portal suffered at least two security glitches that … Read More “Problems with Georgia’s Voter Registration Portal” »

On the Cyber Safety Review Board

Posted on August 6, 2024 By infossl
computer security, cybersecurity, hacking, Security technology, Uncategorized

When an airplane crashes, impartial investigatory bodies leap into action, empowered by law to unearth what happened and why. But there is no such empowered and impartial body to investigate CrowdStrike’s faulty update that recently unfolded, ensnarling banks, airlines, and emergency services to the tune of billions of dollars. We need one. To be sure, … Read More “On the Cyber Safety Review Board” »

New Patent Application for Car-to-Car Surveillance

Posted on August 5, 2024 By infossl
cars, patents, police, Security technology, Uncategorized

Ford has a new patent application for a system where cars monitor each other’s speeds, and then report then to some central authority. Slashdot thread. Powered by WPeMatico

Friday Squid Blogging: Treating Squid Parasites

Posted on August 2, 2024 By infossl
Security technology, squid, Uncategorized

A newly discovered parasite that attacks squid eggs has been treated. Blog moderation policy. Powered by WPeMatico

Leaked GitHub Python Token

Posted on August 2, 2024 By infossl
leaks, security analysis, Security technology, supply chain, Uncategorized

Here’s a disaster that didn’t happen: Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container hosted on Docker Hub, which granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF). JFrog discussed what could have happened: The … Read More “Leaked GitHub Python Token” »

Education in Secure Software Development

Posted on August 1, 2024 By infossl
security education, Security technology, software, Uncategorized

The Linux Foundation and OpenSSF released a report on the state of education in secure software development. …many developers lack the essential knowledge and skills to effectively implement secure software development. Survey findings outlined in the report show nearly one-third of all professionals directly involved in development and deployment ­ system operations, software developers, committers, … Read More “Education in Secure Software Development” »

Nearly 7% of Internet Traffic Is Malicious

Posted on July 31, 2024 By infossl
denial of service, malware, Security technology, spam, Uncategorized, vulnerabilities

Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes after proof-of-concepts are published. News articles. Powered by WPeMatico

Providing Security Updates to Automobile Software

Posted on July 30, 2024 By infossl
books, cars, cybersecurity, Security technology, software, Uncategorized

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight years after their purchase date. Samsung and Google provide Android OS updates and security updates for seven years. Apple halts servicing products seven years after they stop selling them. … Read More “Providing Security Updates to Automobile Software” »

Posts pagination

Previous 1 … 10 11 12 … 105 Next
fr_FR

Recent Posts

  • Florida Backdoor Bill Fails
  • Friday Squid Blogging: Japanese Divers Video Giant Squid
  • Chinese AI Submersible
  • Fake Student Fraud in Community Colleges
  • Another Move in the Deepfake Creation/Detection Arms Race

Tags

academicpapers airgaps android anonymity authentication borders cars cellphones censorship control courts crime cryptanalysis cryptography cryptowars deanonymization edwardsnowden encryption fbi fear geolocation guardian hacking intelligence ios jamming keyescrow lies malware medicine nationalsecuritypolicy nsa pointofsale printers privacy rc4 retail secrecy sidechannelattacks socialmedia squid surveillance tracking tradecraft whistleblowers

Categories

  • 3dprinters
  • 911
  • A Hacker's Mind
  • academic
  • academic papers
  • academicpapers
  • accountability
  • aclu
  • activism
  • adobe
  • advanced persistent threats
  • advancedpersistentthreats
  • adware
  • aes
  • AI
  • air travel
  • airgaps
  • airtravel
  • al Qaeda
  • alarms
  • algorithms
  • alqaeda
  • amazon
  • android
  • anonymity
  • Anonymous
  • antivirus
  • apache
  • apple
  • Applied Cryptography
  • appliedcryptography
  • artificial intelligence
  • artificialintelligence
  • assassinations
  • atms
  • att
  • attribution
  • audio
  • auditing
  • australia
  • authentication
  • authorization
  • automation
  • backdoors
  • backups
  • banking
  • baserate
  • behavioraldetection
  • Beyond Fear
  • beyondfear
  • bgp
  • biological warfare
  • biologicalwarfare
  • biometrics
  • bios
  • bitcoin
  • BitLocker
  • blackberry
  • blackmail
  • blockchain
  • bluetooth
  • bombs
  • books
  • borders
  • botnets
  • brazil
  • breaches
  • bribes
  • browsers
  • business of security
  • businessofsecurity
  • CALEA
  • cameras
  • camouflage
  • canada
  • captchas
  • cars
  • casinos
  • cell phones
  • cellphones
  • censorship
  • certificates
  • certifications
  • ch2ke
  • chatbots
  • ChatGPT
  • cheating
  • chelseamanning
  • chess
  • child pornography
  • childpornography
  • children
  • china
  • chipandpin
  • chrome
  • Chrome OS
  • cia
  • cisco
  • Citizen Lab
  • citizenlab
  • cloning
  • cloud computing
  • cloudcomputing
  • co3systems
  • coastguard
  • colombia
  • complexity
  • compliance
  • computer security
  • computersecurity
  • concealment
  • conferences
  • cons
  • consumerization
  • contests
  • control
  • cookies
  • cooperation
  • copyright
  • costbenefitanalysis
  • courts
  • cover-ups
  • coverups
  • COVID-19
  • covid19
  • cracking
  • credentials
  • credit cards
  • creditcards
  • crime
  • cross-site scripting
  • crowdsourcing
  • cryptanalysis
  • crypto wars
  • cryptocurrency
  • cryptography
  • cryptome
  • cryptowars
  • cuba
  • cyberattack
  • cybercrime
  • cyberespionage
  • cybersecurity
  • cyberterrorism
  • cyberwar
  • cyberweapons
  • dark web
  • darkweb
  • darpa
  • Data and Goliath
  • data breaches
  • data collection
  • data destruction
  • data loss
  • data mining
  • data privacy
  • data protection
  • dataandgoliath
  • databases
  • databreaches
  • datacollection
  • datadestruction
  • dataloss
  • datamining
  • dataprotection
  • dataretention
  • de-anonymization
  • dea
  • deaddrops
  • deanonymization
  • debates
  • deception
  • deep fake
  • deepfake
  • defense
  • democracy
  • deniability
  • denial of service
  • denialofservice
  • Department of Defense
  • departmentofdefense
  • dhs
  • disclosure
  • disguise
  • disinformation
  • dmca
  • dna
  • dns
  • doghouse
  • domain names
  • doxing
  • drm
  • drones
  • drug trade
  • drugtrade
  • e-mail
  • eavesdropping
  • ebay
  • ebooks
  • economics of security
  • economicsofsecurity
  • Edward Snowden
  • edwardsnowden
  • eff
  • egypt
  • email
  • embedded systems
  • embeddedsystems
  • employment
  • encryption
  • enigma
  • EPIC
  • epidemiology
  • espionage
  • essays
  • estonia
  • ethics
  • eu
  • EULA
  • exploits
  • externalities
  • extortion
  • face recognition
  • facebook
  • facerecognition
  • fake news
  • fakenews
  • false positives
  • falsenegatives
  • falsepositives
  • fbi
  • fear
  • feudalsecurity
  • filesharing
  • filtering
  • finance
  • fingerprints
  • firefox
  • firewall
  • firmware
  • fisa
  • foia
  • forensics
  • forgery
  • Fortuna
  • france
  • fraud
  • fsecure
  • ftc
  • g7
  • gambling
  • game theory
  • games
  • gametheory
  • gaming consoles
  • gchq
  • gdpr
  • generations
  • geolocation
  • Georgia
  • germany
  • gmail
  • google
  • googleglass
  • gps
  • Greece
  • Guardian
  • guns
  • hackback
  • hacking
  • hardware
  • hashes
  • healthcare
  • Hezbollah
  • history of computing
  • history of cryptography
  • history of security
  • historyofcomputing
  • historyofcryptography
  • historyofsecurity
  • hoaxes
  • homelandsecurity
  • homomorphic encryption
  • hotels
  • hp
  • https
  • human rights
  • humor
  • ibm
  • ics
  • idcards
  • identification
  • identity theft
  • identitytheft
  • impersonation
  • implants
  • incentives
  • incident response
  • incidentresponse
  • india
  • infrastructure
  • inrupt
  • insiders
  • insurance
  • intel
  • intelligence
  • internet
  • Internet and society
  • Internet of Things
  • internetandsociety
  • internetexplorer
  • internetofthings
  • interviews
  • intrusion detection
  • ios
  • iphone
  • iran
  • iraq
  • ireland
  • irs
  • isis
  • isps
  • israel
  • italy
  • jamming
  • japan
  • Juniper
  • kaspersky
  • kazakhstan
  • key logging
  • keyescrow
  • keylogging
  • keys
  • kidnapping
  • killswitch
  • law enforcement
  • lawenforcement
  • laws
  • leaks
  • lebanon
  • lenovo
  • Liars and Outliers
  • liarsandoutliers
  • lies
  • linkedin
  • linux
  • LLM
  • locks
  • loopholes
  • lotteries
  • machine learning
  • machinelearning
  • mail
  • malware
  • man-in-the-middle attacks
  • maninthemiddleattacks
  • marketing
  • mcafee
  • md5
  • medicine
  • Meta
  • metadata
  • microsoft
  • military
  • mitigation
  • monoculture
  • movieplotthreats
  • mozilla
  • music
  • national security policy
  • nationalism
  • nationalsecurityletters
  • nationalsecuritypolicy
  • natural security
  • naturalsecurity
  • networksecurity
  • New York Times
  • Nigeria
  • nist
  • no-fly list
  • Non classé
  • noncomputer hacks
  • North Korea
  • northkorea
  • norway
  • nsa
  • obscurity
  • onetimepads
  • open source
  • opensource
  • operating systems
  • operatingsystems
  • operational security
  • operationalsecurity
  • overreactions
  • pakistan
  • Password Safe
  • passwords
  • passwordsafe
  • patching
  • patents
  • patriotact
  • paypal
  • penetration testing
  • penetrationtesting
  • pgp
  • phishing
  • phones
  • photos
  • physical security
  • physicalsecurity
  • pins
  • plagiarism
  • point of sale
  • pointofsale
  • police
  • policy
  • pornography
  • power
  • press
  • printers
  • prison escapes
  • prisons
  • privacy
  • privilege escalation
  • programming
  • propaganda
  • protocols
  • proxies
  • pseudonymity
  • psychology of security
  • psychologyofsecurity
  • public interest
  • public transit
  • publicinterest
  • publictransit
  • qatar
  • QR codes
  • quantum computing
  • quantum cryptography
  • quantumcomputing
  • quantumcryptography
  • radio
  • random numbers
  • randomnumbers
  • ransomware
  • redaction
  • regulation
  • replayattacks
  • reports
  • reputation
  • resilience
  • Resilient Systems
  • resilientsystems
  • restaurants
  • retail
  • reverse engineering
  • reverseengineering
  • rfid
  • risk assessment
  • riskassessment
  • risks
  • robbery
  • robotics
  • rootkits
  • rsa
  • russia
  • sabotage
  • Safari
  • safes
  • samsung
  • saudiarabia
  • scada
  • scams
  • scanners
  • Schneier news
  • Schneier on Security (book)
  • schneiernews
  • schneierslaw
  • schools
  • sciencefiction
  • search engines
  • searches
  • secrecy
  • secretsharing
  • security analysis
  • security conferences
  • security education
  • security engineering
  • security standards
  • Security technology
  • security theater
  • security tokens
  • securityanalysis
  • securityawareness
  • securityconferences
  • securityeducation
  • securityengineering
  • securitymindset
  • securitymonitoring
  • securitypolicies
  • securityquestions
  • securitystandards
  • securitytheater
  • securitytokens
  • sensors
  • sha1
  • side-channel attacks
  • sidechannelattacks
  • signal
  • signatures
  • SIM cards
  • simcards
  • skimmers
  • skype
  • smart cards
  • smartcards
  • smartphones
  • sms
  • smuggling
  • snake oil
  • snakeoil
  • social engineering
  • social media
  • socialengineering
  • socialmedia
  • societalsecurity
  • software
  • software liability
  • softwareliability
  • sony
  • southkorea
  • spain
  • spam
  • spoofing
  • sports
  • spyware
  • SQL injection
  • sqlinjection
  • squid
  • ss7
  • ssh
  • ssl
  • stalking
  • steganography
  • stuxnet
  • supply chain
  • supplychain
  • surveillance
  • sweden
  • switzerland
  • symantec
  • syria
  • T-Mobile
  • Taiwan
  • tamper detection
  • tamperdetection
  • taxonomies
  • TED
  • telecom
  • telegram
  • television
  • tempest
  • terms of service
  • termsofservice
  • terrorism
  • Thailand
  • theft
  • threat models
  • threatalerts
  • threatmodels
  • tls
  • tor
  • torrents
  • torture
  • tpm
  • tracing
  • tracking
  • tradecraft
  • traffic analysis
  • trafficanalysis
  • transparency
  • transportation
  • treaties
  • trust
  • tsa
  • turkey
  • twitter
  • two-factor authentication
  • twofactorauthentication
  • twofish
  • uae
  • uber
  • uk
  • ukraine
  • un
  • Uncategorized
  • undercover
  • unitedarabemirates
  • usability
  • usb
  • usps
  • utilities
  • uzbekistan
  • verisign
  • verizon
  • video
  • videoconferencing
  • videos
  • violence
  • voice recognition
  • voicerecognition
  • voip
  • voting
  • vpn
  • vulnerabilities
  • war
  • war on the unexpected
  • warontheunexpected
  • watchlists
  • weapons
  • web
  • web privacy
  • webprivacy
  • whatsapp
  • whistleblowers
  • Wi-Fi
  • wifi
  • wikileaks
  • windows
  • wireless
  • yahoo
  • zero-day
  • zeroday

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014

Copyright © 2025 SSL and internet security news.

Theme: Oceanly by ScriptsTown