With a name like ‘Freaky Leaky SMS’ I had to cover this research. Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings (arxiv.org) At the moment this a research paper, the “attack” has only be carried out in the lab and it takes a large amount of preparatory work. …
Cyber Security and ChatGPT
The use of ChatGPT as a tool of the threat actor has been discussed – here is an example of how researchers are manipulating ChatGPT chatbot to demonstrate their potential misuse in real world applications: The Security Hole at the Heart of ChatGPT and Bing | WIRED UK
Hacked in Space
Ok it is clickbait of a type – but this is a serious story of how systems we all depend can be vulnerable after extended research of both white and (possibly) black hat hackers. In this case legitimate cyber security researchers will demonstrate to the European Space Agency (ESA) how …
I just love this cyber security story…
This is all just academic research (at the moment) but here is a story about exploiting the range of voice assistants, Siri, Google Assistant, Alexa and Cortana, using voice commands, issued from one device, that are inaudible to the human owners, but can activate another device. To do what? Here …
WiFi Frame leak research
Domien Schepers and Aanjhan Ranganathan of Northeastern University and Mathy Vanhoef of imec-DistriNet, KU Leuven, have published a paper demonstrating a flaw in the way WiFi access points handle power saving requests to and from devices. This could enable a threat actor to manipulate the WiFi frames passing between devices …
Poisoning AI output
We all know (unless you have had your head under a pillow) that ChatGPT is an artificial intelligence system that among its capabilities it can write a love poem, and academic paper, computer code or even your homework. It can also answer your questions – just ask Bing! ChatGPT AI …
Exploitation and how to avoid it…
…just slow down. I often use the example of a successful social engineering/phishing email as one that arrives when you are under work pressure or just before before you want to leave for the weekend. Both are periods when the threat actors know your guard will be down – they …