Recent Issues
July 15, 2024
In this issue:
- Using LLMs to Exploit Vulnerabilities
- Rethinking Democracy for the Age of AI
- The Hacking of Culture and the Creation of Socio-Technical Debt
- New Blog Moderation Policy
- Recovering Public Keys from Signatures
- Ross Anderson’s Memorial Service
- Paul Nakasone Joins OpenAI’s Board of Directors
- Breaking the M-209
- The US Is Banning Kaspersky
- Security Analysis of the EU’s Digital Wallet
- James Bamford on Section 702 Extension
- Model Extraction from Neural Networks
- Public Surveillance of Bars
- Upcoming Book on AI and Democracy
- New Open SSH Vulnerability
- On the CSRB’s Non-Investigation of the SolarWinds Attack
- Reverse-Engineering Ticketmaster’s Barcode System
- RADIUS Vulnerability
- Apple Is Alerting iPhone Users of Spyware Attacks
- The NSA Has a Long-Lost Lecture by Adm. Grace Hopper
- Upcoming Speaking Engagements
June 15, 2024
In this issue:
- Zero-Trust DNS
- FBI Seizes BreachForums Website
- IBM Sells Cybersecurity Group
- Detecting Malicious Trackers
- Unredacting Pixelated Text
- Personal AI Assistants and Privacy
- On the Zero-Day Market
- Lattice-Based Cryptosystems and Quantum Cryptanalysis
- Privacy Implications of Tracking Wireless Access Points
- Supply Chain Attack against Courtroom Software
- How AI Will Change Democracy
- AI Will Increase the Quantity—and Quality—of Phishing Scams
- Seeing Like a Data Structure
- Breaking a Password Manager
- Online Privacy and Overfishing
- Espionage with a Drone
- The Justice Department Took Down the 911 S5 Botnet
- Security and Human Behavior (SHB) 2024
- Exploiting Mistyped URLs
- LLMs Acting Deceptively
- Using AI for Political Polling
- AI and the Indian Election
- Demo of AES GCM Misuse Problems
- Upcoming Speaking Engagements
May 15, 2024
In this issue:
- New Lattice Cryptanalytic Technique
- X.com Automatically Changing Link Text but Not URLs
- Using AI-Generated Legislative Amendments as a Delaying Technique
- Other Attempts to Take Over Open Source Projects
- Using Legitimate GitHub URLs for Malware
- Microsoft and Security Incentives
- Dan Solove on Privacy Regulation
- The Rise of Large-Language-Model Optimization
- Long Article on GM Spying on Its Cars’ Drivers
- Whale Song Code
- WhatsApp in India
- AI Voice Scam
- The UK Bans Default Passwords
- Rare Interviews with Enigma Cryptanalyst Marian Rejewski
- My TED Talks
- New Lawsuit Attempting to Make Adversarial Interoperability Legal
- New Attack on VPNs
- How Criminals Are Using Generative AI
- New Attack Against Self-Driving Car AI
- LLMs’ Data-Control Path Insecurity
- Another Chrome Vulnerability
- Upcoming Speaking Engagements
April 15, 2024
In this issue:
- Improving C++
- Drones and the US Air Force
- AI and the Evolution of Social Media
- Cheating Automatic Toll Booths by Obscuring License Plates
- Public AI as an Alternative to Corporate AI
- Google Pays $10M in Bug Bounties in 2023
- Licensing AI Engineers
- On Secure Voting Systems
- Security Vulnerability in Saflok’s RFID-Based Keycard Locks
- Hardware Vulnerability in Apple’s M-Series Chips
- Lessons from a Ransomware Attack against the British Library
- Ross Anderson
- Magic Security Dust
- Declassified NSA Newsletters
- XZ Utils Backdoor
- Class-Action Lawsuit against Google’s Incognito Mode
- Surveillance by the New Microsoft Outlook App
- Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed
- Security Vulnerability of HTML Emails
- US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack
- In Memoriam: Ross Anderson, 1956-2024
- Backdoor in XZ Utils That Almost Happened
- Smuggling Gold by Disguising it as Machine Parts
- Upcoming Speaking Engagements
March 15, 2024
In this issue:
- On the Insecurity of Software Bloat
- European Court of Human Rights Rejects Encryption Backdoors
- Microsoft Is Spying on Users of Its AI Tools
- Details of a Phone Scam
- New Image/Video Prompt Injection Attacks
- AIs Hacking Websites
- Apple Announces Post-Quantum Encryption Algorithms for iMessage
- China Surveillance Company Hacked
- A Cyber Insurance Backstop
- How the “Frontier” Became the Slogan of Uncontrolled AI
- NIST Cybersecurity Framework 2.0
- LLM Prompt Injection Worm
- The Insecurity of Video Doorbells
- Surveillance through Push Notifications
- How Public AI Can Strengthen Democracy
- A Taxonomy of Prompt Injection Attacks
- Essays from the Second IWORD
- Using LLMs to Unredact Text
- Jailbreaking LLMs with ASCII Art
- Burglars Using Wi-Fi Jammers to Disable Security Cameras
- Automakers Are Sharing Driver Data with Insurers without Consent
February 15, 2024
In this issue:
- Voice Cloning with Very Short Samples
- The Story of the Mirai Botnet
- Code Written with AI Assistants Is Less Secure
- Canadian Citizen Gets Phone Back from Police
- Speaking to the CIA’s Creative Writing Group
- Zelle Is Using My Name and Voice without My Consent
- AI Bots on X (Twitter)
- Side Channels Are Common
- Poisoning AI Models
- Quantum Computing Skeptics
- Chatbots and Human Conversation
- Microsoft Executives Hacked
- NSA Buying Bulk Surveillance Data on Americans without a Warrant
- New Images of Colossus Released
- CFPB’s Proposed Data Rules
- Facebook’s Extensive Surveillance Network
- A Self-Enforcing Protocol to Solve Gerrymandering
- David Kahn
- Deepfake Fraud
- Documents about the NSA’s Banning of Furby Toys in the 1990s
- Teaching LLMs to Be Deceptive
- On Software Liabilities
- No, Toothbrushes Were Not Used in a Massive DDoS Attack
- On Passkey Usability
- Molly White Reviews Blockchain Book
- A Hacker’s Mind is Out in Paperback
- Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
- Upcoming Speaking Engagements
January 15, 2024
In this issue:
- A Robot the Size of the World
- Police Get Medical Records without a Warrant
- OpenAI Is Not Training on Your Dropbox Documents — Today
- GCHQ Christmas Codebreaking Challenge
- Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists
- Data Exfiltration Using Indirect Prompt Injection
- Ben Rothke’s Review of A Hacker’s Mind
- Google Stops Collecting Location Data from Maps
- New iPhone Security Features to Protect Stolen Devices
- AI and Lossy Bottlenecks
- AI Is Scarily Good at Guessing the Location of Random Photos
- TikTok Editorial Analysis
- Facial Recognition Systems in the US
- New iPhone Exploit Uses Four Zero-Days
- Improving Shor’s Algorithm
- Second Interdisciplinary Workshop on Reimagining Democracy
- PIN-Stealing Android Malware
- Facial Scanning by Burger King in Brazil
- Pharmacies Giving Patient Records to Police without Warrants
- On IoT Devices and Software Liability
- Upcoming Speaking Engagements
December 15, 2023
In this issue:
- New SSH Vulnerability
- Leaving Authentication Credentials in Public Code
- FTC’s Voice Cloning Challenge
- Ransomware Gang Files SEC Complaint
- Using Generative AI for Surveillance
- Email Security Flaw Found in the Wild
- Apple to Add Manual Authentication to iMessage
- LitterDrifter USB Worm
- Chocolate Swiss Army Knife
- Secret White House Warrantless Surveillance Program
- Digital Car Keys Are Coming
- Breaking Laptop Fingerprint Sensors
- Extracting GPT’s Training Data
- AI Decides to Engage in Insider Trading
- AI and Trust
- AI and Mass Spying
- Security Analysis of a Thirteenth-Century Venetian Election Protocol
- Spying through Push Notifications
- New Bluetooth Attack
- Facebook Enables Messenger End-to-End Encryption by Default
- New Windows/Linux Firmware Attack
- Surveillance by the US Postal Service
- Surveillance Cameras Disguised as Clothes Hooks
November 15, 2023
In this issue:
- Coin Flips Are Biased
- Security Vulnerability of Switzerland’s E-Voting System
- Analysis of Intellexa’s Predator Spyware
- Former Uber CISO Appealing His Conviction
- AI and US Election Rules
- Child Exploitation and the Crypto Wars
- EPA Won’t Force Water Utilities to Audit Their Cybersecurity
- Microsoft is Soft-Launching Security Copilot
- New NSA Information from (and about) Snowden
- Messaging Service Wiretap Discovered through Expired TLS Cert
- Hacking Scandinavian Alcohol Tax
- The Future of Drone Warfare
- Spyware in India
- New York Increases Cybersecurity Rules for Financial Companies
- Crashing iPhones with a Flipper Zero
- Spaf on the Morris Worm
- Decoupling for Security
- Online Retail Hack
- The Privacy Disaster of Modern Smart Cars
- Ten Ways AI Will Change Democracy
- How .tk Became a TLD for Scammers
- Upcoming Speaking Engagements
October 15, 2023
In this issue:
- On Technologies for Automatic Facial Recognition
- LLM Summary of My Book Beyond Fear
- Using Hacked LastPass Keys to Steal Cryptocurrency
- Detecting AI-Generated Text
- On the Cybersecurity Jobs Shortage
- New Revelations from the Snowden Documents
- Signal Will Leave the UK Rather Than Add a Backdoor
- Critical Vulnerability in libwebp Library
- NSA AI Security Center
- Hacking Gas Pumps via Bluetooth
- Malicious Ads in Bing Chat
- Political Disinformation and AI
- Deepfake Election Interference in Slovakia
- AI Risks
- Model Extraction Attack on Neural Networks
- Cisco Can’t Stop Using Hard-Coded Passwords
- Bounty to Recover NIST’s Elliptic Curve Seeds
- Hacking the High School Grading System
Sidebar photo of Bruce Schneier by Joe MacInnis.