An air-gapped system is designed to be very secure. It is not connected to any other system, network or internet – literally a physical gap between it and the rest of the IT world. If it is not connected, then threat actors cannot connect to it. Mordechai Guri, from Ben-Gurion …
Is there censorship on the web?
Of course there is, and in some surprising places. Here is a report by the The Citizen Lab, examining how Microsoft Bing censors autosuggestions on politically sensitive Chinese names and other topics. This is not only applied in China, as we would expect, but in other regions too! Bada Bing, …
The Rolling Pwn Attack – Honda drivers beware! UPDATED
Here is another research paper outlining how the wireless security car manufacturers are suing to secure our vehicles is woefully inadequate. The vulnerability often comes from the technology being used, having been developed for another task altogether. This time it is Honda – check to see if your car is …
Continue reading “The Rolling Pwn Attack – Honda drivers beware! UPDATED”
This is a technology exercise in when everything goes wrong!
I was put onto this blog post via Bruce Schneier’s blog. I’ve locked myself out of my digital life – Terence Eden’s Blog (shkspr.mobi) This is why role play and thinking about your operation, is a vital part of creating a cyber security plan that is resilient and provides for …
Continue reading “This is a technology exercise in when everything goes wrong!”
Back to Google’s “sentient” AI
Here are a couple of articles looking at the issues raised around Google’s AI chatbot, LaMDA (language model for dialog applications), because Blake Lemoine, an engineer working with the system, has claimed LaMDA is sentient. Google was not pleased – they suspended Blake, for publishing confidential company property. Google does …