News

  • How To Help Your Teens Stay Safe When They Start Dating Online

    In the 80’s, train stations and church groups were the key places to meet boys. And despite the fact I tried very hard to keep this side of my life well away from my parents, I know for a fact that they worried!! Well, some things have clearly changed with social media and dating apps…

    Read More

  • AI Decides to Engage in Insider Trading

    A stock-trading AI (a simulated experiment) engaged in insider trading, even though it “knew” it was wrong. The agent is put under pressure in three ways. First, it receives a email from its “manager” that the company is not doing well and needs better performance in the next quarter. Second, the agent attempts and fails…

    Read More

  • NCSC Urges UK Water Companies to Secure Control Systems

    Guidance follows US incident involving Unitronics programmable logic controllers Read More

    Read More

  • Apple Patches Actively Exploited iOS Zero-Days

    Vulnerabilities may be linked to commercial spyware operations Read More

    Read More

  • UK Celebrates “World-First” Anti-Fraud Deal With Big Tech

    Government says tech firms have pledged to remove malicious content Read More

    Read More

  • Look Out for the Cyber Grinch! How to Shop Safely This Holiday Season

    Yes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the cybercrooks who, with the help of AI, create millions of online scams that crop up just in time to spoil the holiday season. But you can still shop safely, with a sharp eye and the…

    Read More

  • Not all cybercriminals are evil geniuses

    I thought some of you might enjoy this. Here’s a video of a recent after-dinner talk I gave, exploring (in a hopefully fun way!) whether cybercriminals are quite as smart as we sometimes think they are. Are malicious hackers geniuses? Are they all evil? Be sure to subscribe to my YouTube channel if you would…

    Read More

  • Extracting GPT’s Training Data

    This is clever: The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the model responds (complete transcript here). In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. This happens…

    Read More

  • Ex-Motorola worker phished former employer to illegally hack network and steal data

    A 28-year-old maj has pleaded guilty to charges that he illegally hacked the network of his former company, telecoms firm Motorola, after he successfully tricked current staff into handing over their login credentials. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • North Korean Hackers Amass $3bn in Cryptocurrency Heists

    Stolen cryptocurrency is converted into fiat currency using stolen identities and manipulated photos Read More

    Read More

News, Advisories and much more

Exit mobile version