❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 17 May 2024Main stream

Zero-Trust DNS – Source: www.schneier.com

zero-trust-dns-–-source:-wwwschneier.com

Source: www.schneier.com – Author: Bruce Schneier Zero-Trust DNS Microsoft is working on a promising-looking protocol to lock down DNS. ZTDNS aims to solve this decades-old problem by integrating the Windows DNS engine with the Windows Filtering Platformβ€”the core component of the Windows Firewallβ€”directly into client devices. Jake Williams, VP of research and development at consultancy […]

La entrada Zero-Trust DNS – Source: www.schneier.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Before yesterdayMain stream

Upcoming Speaking Engagements – Source: www.schneier.com

upcoming-speaking-engagements-–-source:-wwwschneier.com

Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I’m a fellow and lecturer at Harvard’s Kennedy School, a board member of EFF, […]

La entrada Upcoming Speaking Engagements – Source: www.schneier.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Another Chrome Vulnerability – Source: www.schneier.com

another-chrome-vulnerability-–-source:-wwwschneier.com

Source: www.schneier.com – Author: Bruce Schneier Google has patched another Chrome zero-day: On Thursday, Google said an anonymous source notified it of the vulnerability. The vulnerability carries a severity rating of 8.8 out of 10. In response, Google said, it would be releasing versions 124.0.6367.201/.202 for macOS and Windows and 124.0.6367.201 for Linux in subsequent […]

La entrada Another Chrome Vulnerability – Source: www.schneier.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

LLMs’ Data-Control Path Insecurity – Source: www.schneier.com

llms’-data-control-path-insecurity-–-source:-wwwschneier.com

Source: www.schneier.com – Author: B. Schneier Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain Crunch cereal worked to make the right sound. That […]

La entrada LLMs’ Data-Control Path Insecurity – Source: www.schneier.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Friday Squid Blogging: Squid Mating Strategies – Source: www.schneier.com

friday-squid-blogging:-squid-mating-strategies-–-source:-wwwschneier.com

Source: www.schneier.com – Author: Bruce Schneier HomeBlog Friday Squid Blogging: Squid Mating Strategies Some squids are β€œconsorts,” others are β€œsneakers.” The species is healthiest when individuals have different strategies randomly. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog […]

La entrada Friday Squid Blogging: Squid Mating Strategies – Source: www.schneier.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

New Attack Against Self-Driving Car AI – Source: www.schneier.com

new-attack-against-self-driving-car-ai-–-source:-wwwschneier.com

Source: www.schneier.com – Author: Bruce Schneier This is another attack that convinces the AI to ignore road signs: Due to the way CMOS cameras operate, rapidly changing light from fast flashing diodes can be used to vary the color. For example, the shade of red on a stop sign could look different on each line […]

La entrada New Attack Against Self-Driving Car AI – Source: www.schneier.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

❌
❌