Domien Schepers and Aanjhan Ranganathan of Northeastern University and Mathy Vanhoef of imec-DistriNet, KU Leuven, have published a paper demonstrating a flaw in the way WiFi access points handle power saving requests to and from devices. This could enable a threat actor to manipulate the WiFi frames passing between devices …
Poisoning AI output
We all know (unless you have had your head under a pillow) that ChatGPT is an artificial intelligence system that among its capabilities it can write a love poem, and academic paper, computer code or even your homework. It can also answer your questions – just ask Bing! ChatGPT AI …
Exploitation and how to avoid it…
…just slow down. I often use the example of a successful social engineering/phishing email as one that arrives when you are under work pressure or just before before you want to leave for the weekend. Both are periods when the threat actors know your guard will be down – they …
The bad guys do not always get it right…
I write a lot of bad news stories here, it is the nature of a cyber security news site – that’s why we have Because It’s Friday – but here is a good news story when the threat actors get it wrong: First Linux variant of Clop ransomware targeted universities, …
Encryption is safe (for the moment)
You can carry on shopping online… At the beginning of the year I ran a short story on some Chinese research that said it had taken a step towards breaking the encryption we all depend on the use the internet and electronic communications securely: Breaking encryption – Smart Thinking Solutions …