#cybersecurity #tech
27 Nov. 2023 - 11:59 UTC
There seems to be no end to warrantless surveillance: According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, [...]
24 Nov. 2023 - 22:04 UTC
Pretty photograph. The Squid Nebula is shown in blue, indicating doubly ionized oxygen—­which is when you ionize your oxygen once and then ionize it again just to make sure. (In all [...]
24 Nov. 2023 - 20:00 UTC
It’s realistic looking. If I drop it in a bin with my keys and wallet, will the TSA confiscate it?
24 Nov. 2023 - 12:04 UTC
A new worm that spreads via USB sticks is infecting computers in Ukraine and beyond. The group­—known by many names, including Gamaredon, Primitive Bear, ACTINIUM, Armageddon, and [...]
22 Nov. 2023 - 12:08 UTC
Signal has had the ability to manually authenticate another account for years. iMessage is getting it: The feature is called Contact Key Verification, and it does just what its name says: it lets you [...]
21 Nov. 2023 - 12:05 UTC
Google’s Threat Analysis Group announced a zero-day against the Zimbra Collaboration email server that has been used against governments around the world. TAG has observed four different groups [...]
20 Nov. 2023 - 11:57 UTC
Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My guess is that it isn’t very good yet, but [...]
17 Nov. 2023 - 22:01 UTC
In a rare squid/security post, here’s an article about unpatched vulnerabilities in the Squid caching proxy. As usual, you can also use this squid post to talk about the security stories in the [...]
17 Nov. 2023 - 16:31 UTC
A ransomware gang, annoyed at not being paid, filed an SEC complaint against its victim for not disclosing its security breach within the required four days. This is over the top, but is just another [...]
16 Nov. 2023 - 18:46 UTC
The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.”