Chinese Hacking of US Critical Infrastructure
Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details...
Schneier on Security
Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details...
It’s neither hard nor expensive: Unlike password authentication, which requires a direct match between what is inputted and what’s stored...
Atlas Obscura has a five-part online course on cephalopods, taught by squid biologist Dr. Sarah McAnulty. As usual, you can...
Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that...
Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given that we’ve known about model poisoning for years, and given...
It’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the...
In case you don’t have enough to worry about, someone has built a credible handwriting machine: This is still a...
Google has backtracked on its plan to delete inactive YouTube videos—at least for now. Of course, it could change its...
A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports...
Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could...