We have come a long way in cryptography and computing since the Colossus electronic computer, (above), was built at Bletchley Park, during the Second World War, to break the Lorenz cipher. With the advances in computing technology, there is a foreseeable point in the future, possibly only ten years, when …
This is a technology exercise in when everything goes wrong!
I was put onto this blog post via Bruce Schneier’s blog. I’ve locked myself out of my digital life – Terence Eden’s Blog (shkspr.mobi) This is why role play and thinking about your operation, is a vital part of creating a cyber security plan that is resilient and provides for …
Continue reading “This is a technology exercise in when everything goes wrong!”
Has June’s Patch Tuesday broken some Microsoft 365 sign-ins? UPDATE 22 June 2022
This post was first published on 20 June 2022 Update 22 June 2022 We have not had to wait for the next Patch Tuesday for the fix – Microsoft has issued an out-of-band patch for Windows: Windows emergency update fixes Microsoft 365 issues on Arm devices (bleepingcomputer.com) Original post There …
Continue reading “Has June’s Patch Tuesday broken some Microsoft 365 sign-ins? UPDATE 22 June 2022”
Today Internet Explorer 11 is no more…
End of support for Internet Explorer 11 web browser Today 15 June 2022, Microsoft will retire the Internet Explorer (IE) 11 after 27 years of Internet Explorer being included with Windows. There will no longer be security updates for the application, which means when the threat actors find flaws in …
Machine learning is vulnerable to a wide variety of attacks
This paper looks at how threat actors can manipulate and poison machine learning training, to twist the systems to their goals. The goals are achieved without impacting the integrity of the underlying data sets. Manipulating SGD with Data Ordering Attacks (arxiv.org) Shumailov, I., Shumaylov, Z., Kazhdan, D., Zhao, Y., Papernot, …
Continue reading “Machine learning is vulnerable to a wide variety of attacks”