I think the number is more than a quarter of the world’s population has a Facebook account, couple that with Meta’s international reputation for information security and ethics and so it is no surprise that it is a target for scammers and threat actors Facebook phishing campaign nets millions in …
Machine learning is vulnerable to a wide variety of attacks
This paper looks at how threat actors can manipulate and poison machine learning training, to twist the systems to their goals. The goals are achieved without impacting the integrity of the underlying data sets. Manipulating SGD with Data Ordering Attacks (arxiv.org) Shumailov, I., Shumaylov, Z., Kazhdan, D., Zhao, Y., Papernot, …
Continue reading “Machine learning is vulnerable to a wide variety of attacks”
Public Interest Technologist
I just have to quote Bruce Schneier here: Back in November 2020, in the middle of the COVID-19 pandemic, I gave a virtual talk at the International Symposium on Technology and Society: “The Story of the Internet and How it Broke Bad: A Call for Public-Interest Technologists.” It was something …
The US Cybersecurity and Infrastructure Security Agency adds 3 known exploits to it’s data base
CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA These alerts are for SAP NetWeaver.
Another example of using Bluetooth for something it was not intended for
Earlier this week, I wrote about the Bluetooth weaknesses that would allow someone to drive off with your Tesla: How to unlock a Tesla that does not belong to you! – Smart Thinking Solutions Here is a research paper, from UC San Diego, that examines how the cryptographic anonymity that …
Continue reading “Another example of using Bluetooth for something it was not intended for”
