Freaky Leaky

With a name like ‘Freaky Leaky SMS’ I had to cover this research. Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings (arxiv.org) At the moment this a research paper, the “attack” has only be carried out in the lab and it takes a large amount of preparatory work. …

Cyber Security and ChatGPT

The use of ChatGPT as a tool of the threat actor has been discussed – here is an example of how researchers are manipulating ChatGPT chatbot to demonstrate their potential misuse in real world applications: The Security Hole at the Heart of ChatGPT and Bing | WIRED UK