This article by Oli Buckley, Professor of Cyber Security at the University of East Anglia and Jason Nurse, Associate Professor in Cyber Security at the University of Kent takes a balanced look at how AI is starting to help threat actors create more believable attacks. Cybercriminals are creating their own …
Towards Secure AI
The UK’s National Cyber Security Centre has joined with other international government agencies, with responsibility for cyber security, from around the world to create guidelines for the secure developement of AI systems. These guideline cover, data poisoning, input manipulation, privacy and IP threats, re-identification of anonomised data, model stealing and …
X – The Wild West of the Internet
It looks like Elon Musk’s social network X has become the new favourite place for threat actors who want to distribute their malware, especially malicious crypto-malware. X users fed up with constant stream of malicious crypto ads (bleepingcomputer.com) Hackers hijack govt and business accounts on X for crypto scams (bleepingcomputer.com) …
Secure AI
The US government Cybersecurity and Infrastructure Security Agency (CISA) has been working with the UK’s National Cyber Security Centre (NCSC) and other partners to produce some guidelines for developing secure AI technologies. Guidelines for secure AI system development – NCSC.GOV.UK Even if you are not in AI the document has …
Is Bluetooth broken?
Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …