Crypto-Gram: 2023 Archives
May 15, 2023
In this issue:
- Swatting as a Service
- Using LLMs to Create Bioweapons
- EFF on the UN Cybercrime Treaty
- New Zero-Click Exploits against iOS
- Using the iPhone Recovery Key to Lock Owners Out of Their iPhones
- Hacking Pickleball
- UK Threatens End-to-End Encryption
- Cyberweapons Manufacturer QuaDream Shuts Down
- AI to Aid Democracy
- Security Risks of AI
- Hacking the Layoff Process
- NIST Draft Document on Post-Quantum Cryptography Guidance
- SolarWinds Detected Six Months Earlier
- Large Language Models and Elections
- AI Hacking Village at DEF CON This Year
- PIPEDREAM Malware against Industrial Control Systems
- FBI Disables Russian Malware
- Building Trustworthy AI
- Ted Chiang on the Risks of AI
- Upcoming Speaking Engagements
April 15, 2023
In this issue:
- NetWire Remote Access Trojan Maker Arrested
- How AI Could Write Our Laws
- Upcoming Speaking Engagements
- US Citizen Hacked by Spyware
- ChatGPT Privacy Flaw
- Mass Ransomware Attack
- Exploding USB Sticks
- A Hacker’s Mind News
- Hacks at Pwn2Own Vancouver 2023
- Security Vulnerabilities in Snipping Tools
- The Security Vulnerabilities of Message Interoperability
- Russian Cyberwarfare Documents Leaked
- UK Runs Fake DDoS-for-Hire Sites
- North Korea Hacking Cryptocurrency Sites with 3CX Exploit
- FBI (and Others) Shut Down Genesis Market
- Research on AI in Adversarial Settings
- LLMs and Phishing
- Car Thieves Hacking the CAN Bus
- FBI Advising People to Avoid Public Charging Stations
- Bypassing a Theft Threat Model
- Gaining an Advantage in Roulette
- Hacking Suicide
- Upcoming Speaking Engagements
March 15, 2023
In this issue:
- Camera the Size of a Grain of Salt
- ChatGPT Is Ingesting Corporate Secrets
- Defending against AI Lobbyists
- Fines as a Security System
- The Insecurity of Photo Cropping
- A Device to Turn Traffic Lights Green
- Cyberwar Lessons from the War in Ukraine
- Putting Undetectable Backdoors in Machine Learning Models
- Banning TikTok
- Side-Channel Attack against CRYSTALS-Kyber
- Fooling a Voice Authentication System with an AI-Generated Voice
- Dumb Password Rules
- Nick Weaver on Regulating Cryptocurrency
- New National Cybersecurity Strategy
- Prompt Injection Attacks on Large Language Models
- BlackLotus Malware Hijacks Windows Secure Boot Process
- Another Malware with Persistence
- Elephant Hackers
- NetWire Remote Access Trojan Maker Arrested
- How AI Could Write Our Laws
- Upcoming Speaking Engagements
February 15, 2023
In this issue:
- Hacked Cellebrite and MSAB Software Released
- The FBI Identified a Tor User
- AI and Political Lobbying
- Security Analysis of Threema
- Real-World Steganography
- Publisher’s Weekly Review of A Hacker’s Mind
- No-Fly List Exposed
- Bulk Surveillance of Money Transfers
- US Cyber Command Operations During the 2022 Midterm Elections
- On Alec Baldwin’s Shooting
- A Guide to Phishing Attacks
- Kevin Mitnick Hacked California Law in 1983
- NIST Is Updating Its Cybersecurity Framework
- Ransomware Payments Are Down
- Passwords Are Terrible (Surprising No One)
- AIs as Computer Hackers
- Manipulating Weights in Face-Recognition AI Systems
- A Hacker’s Mind News
- Attacking Machine Learning Systems
- Malware Delivered through Google Search
- SolarWinds and Market Incentives
- Mary Queen of Scots Letters Decrypted
- Hacking the Tax Code
- A Hacker’s Mind Is Now Published
- On Pig Butchering Scams
- What Will It Take?
- Upcoming Speaking Engagements
January 15, 2023
In this issue:
- A Security Vulnerability in the KmsdBot Botnet
- Apple Patches iPhone Zero-Day
- As Long as We’re on the Subject of CAPTCHAs
- How to Surrender to a Drone
- Trojaned Windows Installer Targets Ukraine
- Ukraine Intercepting Russian Soldiers’ Cell Phone Calls
- Critical Microsoft Code-Execution Vulnerability
- Hacking the JFK Airport Taxi Dispatch System
- LastPass Breach
- Arresting IT Administrators
- QR Code Scam
- Recovering Smartphone Voice from the Accelerometer
- Breaking RSA with a Quantum Computer
- Decarbonizing Cryptocurrencies through Taxation
- Remote Vulnerabilities in Automobiles
- Schneier on Security Audiobook Sale
- Identifying People Using Cell Phone Location Data
- ChatGPT-Written Malware
- Experian Privacy Vulnerability
- Threats of Machine-Generated Text
- Booklist Review of A Hacker’s Mind
- Upcoming Speaking Engagements
Sidebar photo of Bruce Schneier by Joe MacInnis.