#computersecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #computersecurity, aggregated by home.social.
-
Fake #OpenAI #repository on #Hugging #Face pushes #infostealer #malware A #malicious #HuggingFace repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users.
The repository briefly reached #1 on Hugging Face and accumulated 244,000 downloads before the platform responded to reports and removed it.
#computersecurity #security -
https://www.europesays.com/news/24464/ White House Considers Vetting A.I. Models Before They Are Released #Amodei #AnthropicAILLC #ArtificialIntelligence #ComputerSecurity #CyberwarfareAndDefense #Dario #DefenseContracts #DonaldJ #GoogleInc #Headlines #innovation #JD #News #OpenAILabs #RegulationAndDeregulationOfIndustry #Susie #TopStories #trump #UnitedStatesDefenseAndMilitaryForces #UnitedStatesPoliticsAndGovernment #vance #Wiles
-
We're meeting tonight! Friday 1st May at #Glasgow #hackerspace - @thegamerclub at 153 Bath Lane from 6pm 'til late - all welcome!
Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise!
Also join us in Matrix at #2600:glasgow.social (invite link: https://glasgow.social/matrix)
-
The New York Times - Breaking News, US News, World News and Videos [Unofficial] @[email protected] ·Anthropic’s New Mythos A.I. Model Sets Off Global Alarms
https://web.brid.gy/r/https://www.nytimes.com/2026/04/22/technology/anthropics-mythos-ai.html
-
How to Think Like a Security Researcher by Ilkay Adil is free with a Leanpub Reader membership! Or you can buy it for $1.99! https://leanpub.com/security-researcher-mindset #ComputerProgramming #ComputerSecurity
-
How to Think Like a Security Researcher by Ilkay Adil is free with a Leanpub Reader membership! Or you can buy it for $1.99! https://leanpub.com/security-researcher-mindset #ComputerProgramming #ComputerSecurity
-
https://youtube.com/watch?v=V6pgZKVcKpw
If you only watch one video on cyber security this year, make it this one
#infosec #informationsecurity #security #computersecurity #internetsecurity #vulnerability #bugs #bugbounty #cybersecurity #monoculture #cyber
-
“Quantum computation is … nothing less than a distinctly new way of harnessing nature”*…
As the tools in the world around us change, the world– and we– change with them. The onslaught of AI is the change that seems to be grabbing most of our mindshare these days… and with reason. But there are, of course, other changes (in biotech, in materials science, et al.) that are also going to be hugely impactful.
Today, a look at the computing technology stalking up behind AI: quantum computing. As enthusiasts like David Deutsch (author of the quote above) argue, it can have tremendous benefits, perhaps especially in our ability to model (and thus better understand) our reality.
But quantum computing will, if/when it arrives, also present huge challenges to us as individuals and as societies– perhaps most prominently in its threat to the ways in which we protect our systems and our information: We’ve felt pretty safe for decades, secure in the knowledge that we could lose passwords to phising or hacks, but that it would take the “classical” computers we have 1 billion years to break today’s RSA-2048 encryption. A quantum computer could crack it in as little as a hundred seconds.
The technology has been “somewhere on the horizon” for 30 years… so not something that has seemed urgent to confront. But progress has accelerated; a recent Google paper reports on a programming and architectural breakthrough that greatly reduces the computing resources necessary to break classical cryptography… putting the prospect of “Q-Day” (the point at which quantum computers become powerful enough to break standard encryption methods (RSA, ECC), endangering global digital security) much closer, which would put everything from crypto-wallets to our e-banking accounts at risk.
Charlie Wood brings us up to speed…
Some 30 years ago, the mathematician Peter Shor took a niche physics project — the dream of building a computer based on the counterintuitive rules of quantum mechanics — and shook the world.
Shor worked out a way for quantum computers to swiftly solve a couple of math problems that classical computers could complete only after many billions of years. Those two math problems happened to be the ones that secured the then-emerging digital world. The trustworthiness of nearly every website, inbox, and bank account rests on the assumption that these two problems are impossible to solve. Shor’s algorithm proved that assumption wrong.
For 30 years, Shor’s algorithm has been a security threat in theory only. Physicists initially estimated that they would need a colossal quantum machine with billions of qubits — the elements used in quantum calculations — to run it. That estimate has come down drastically over the years, falling recently to a million qubits. But it has still always sat comfortably beyond the modest capabilities of existing quantum computers, which typically have just hundreds of qubits.
However, two different groups of researchers have just announced advances that notably reduce the gap between theoretical estimates and real machines. A star-studded team of quantum physicists at the California Institute of Technology went public with a design for a quantum computer that could break encryption with only tens of thousands of qubits and said that it had formed a company to build the machine. And researchers at Google announced that they had developed an implementation of Shor’s algorithm that is ten times as efficient as the best previous method.
Neither company has the hardware to break encryption today. But the results underscore what some quantum physicists had already come to suspect: that powerful quantum computers may be years away, rather than decades. “If you care about privacy or you have secrets, then you better start looking for alternatives,” said Nikolas Breuckmann, a mathematical physicist at the University of Bristol, who did not work on either of the papers.
While the new results may provide a jolt for the policymakers and corporations that guard our digital infrastructure, they also signal the rapid progress that physicists have made toward building machines that will let them more thoroughly explore the quantum world.
“We’re going to actually do this,” said Dolev Bluvstein, a Caltech physicist and CEO of the new company, Oratomic…
[Wood unpacks the history of the development of the technology and explores the challenges that remain; he concludes…]
… If any group succeeds at building a quantum computer that can realize Shor’s algorithm, it will mark the end an era — specifically, the “Noisy Intermediate Scale Quantum” era, as Preskill dubbed the pre-error-correction period in a 2018 paper. Each researcher has a vision for what to pursue first with a machine in the new “fault-tolerant” era.
[Robert] Huang said he would start by running Shor’s algorithm, just to prove that the device works. After that, he said he would try to use it to speed up machine learning — an application to be detailed in coming work.
Most of the architects building quantum computers, whether at Oratomic or other startups, are physicists at heart. They’re interested in physics, not cryptography. Specifically, they’re interested in all the things a computer fluent in the language of quantum mechanics could teach them about the quantum realm, such as what sort of materials might become superconductors even at warm temperatures. Preskill, for his part, would like to simulate the quantum nature of space-time.
The Caltech group knows it has years of work ahead before any of its dreams have a chance of coming true. But the researchers can’t wait to get started. “Pick a cooler life quest than building the world’s first quantum computer with your friends!” said a jubilant Bluvstein, reached by phone shortly before their paper went live, before rushing off to celebrate…
Eminently worth reading in full: “New Advances Bring the Era of Quantum Computers Closer Than Ever,” from @walkingthedot.bsky.social in @quantamagazine.bsky.social.
* David Deutsch, The Fabric of Reality
###
As we prepare, we might take a moment to appreciate just how vastly and deeply the legacy systems challenged by quantum computing run, recalling that on this date in 1959 Mary Hawes, a computer scientist for the Burroughs Corporation held a meeting of computers users, manufacturers, and academics at the University of Pennsylvania aimed at creating a common business oriented programming language. At the meeting, representative Grace Hopper suggested that they ask the Department of Defense to fund the effort to create such a language. Also attending was Charles Phillips who was director of the Data System Research Staff at the DoD and was excited by the possibility of a common language streamlining their operations. He agreed to sponsor the creation of such a language. This was the genesis of what would eventually become the COBOL language.
To this day COBOL is still the most common programming language used in business, finance, and administrative systems for companies and governments, primarily on mainframe systems, with around 200 billion lines of code still in production use… all of which are in question and/or at risk in a world of quantum computing.
#COBOL #computerSecurity #computers #computing #crypto #cryptocurrency #culture #GraceHopper #history #MaryHawes #quantum #quantumComputing #Science #security #Technology -
“Quantum computation is … nothing less than a distinctly new way of harnessing nature”*…
As the tools in the world around us change, the world– and we– change with them. The onslaught of AI is the change that seems to be grabbing most of our mindshare these days… and with reason. But there are, of course, other changes (in biotech, in materials science, et al.) that are also going to be hugely impactful.
Today, a look at the computing technology stalking up behind AI: quantum computing. As enthusiasts like David Deutsch (author of the quote above) argue, it can have tremendous benefits, perhaps especially in our ability to model (and thus better understand) our reality.
But quantum computing will, if/when it arrives, also present huge challenges to us as individuals and as societies– perhaps most prominently in its threat to the ways in which we protect our systems and our information: We’ve felt pretty safe for decades, secure in the knowledge that we could lose passwords to phising or hacks, but that it would take the “classical” computers we have 1 billion years to break today’s RSA-2048 encryption. A quantum computer could crack it in as little as a hundred seconds.
The technology has been “somewhere on the horizon” for 30 years… so not something that has seemed urgent to confront. But progress has accelerated; a recent Google paper reports on a programming and architectural breakthrough that greatly reduces the computing resources necessary to break classical cryptography… putting the prospect of “Q-Day” (the point at which quantum computers become powerful enough to break standard encryption methods (RSA, ECC), endangering global digital security) much closer, which would put everything from crypto-wallets to our e-banking accounts at risk.
Charlie Wood brings us up to speed…
Some 30 years ago, the mathematician Peter Shor took a niche physics project — the dream of building a computer based on the counterintuitive rules of quantum mechanics — and shook the world.
Shor worked out a way for quantum computers to swiftly solve a couple of math problems that classical computers could complete only after many billions of years. Those two math problems happened to be the ones that secured the then-emerging digital world. The trustworthiness of nearly every website, inbox, and bank account rests on the assumption that these two problems are impossible to solve. Shor’s algorithm proved that assumption wrong.
For 30 years, Shor’s algorithm has been a security threat in theory only. Physicists initially estimated that they would need a colossal quantum machine with billions of qubits — the elements used in quantum calculations — to run it. That estimate has come down drastically over the years, falling recently to a million qubits. But it has still always sat comfortably beyond the modest capabilities of existing quantum computers, which typically have just hundreds of qubits.
However, two different groups of researchers have just announced advances that notably reduce the gap between theoretical estimates and real machines. A star-studded team of quantum physicists at the California Institute of Technology went public with a design for a quantum computer that could break encryption with only tens of thousands of qubits and said that it had formed a company to build the machine. And researchers at Google announced that they had developed an implementation of Shor’s algorithm that is ten times as efficient as the best previous method.
Neither company has the hardware to break encryption today. But the results underscore what some quantum physicists had already come to suspect: that powerful quantum computers may be years away, rather than decades. “If you care about privacy or you have secrets, then you better start looking for alternatives,” said Nikolas Breuckmann, a mathematical physicist at the University of Bristol, who did not work on either of the papers.
While the new results may provide a jolt for the policymakers and corporations that guard our digital infrastructure, they also signal the rapid progress that physicists have made toward building machines that will let them more thoroughly explore the quantum world.
“We’re going to actually do this,” said Dolev Bluvstein, a Caltech physicist and CEO of the new company, Oratomic…
[Wood unpacks the history of the development of the technology and explores the challenges that remain; he concludes…]
… If any group succeeds at building a quantum computer that can realize Shor’s algorithm, it will mark the end an era — specifically, the “Noisy Intermediate Scale Quantum” era, as Preskill dubbed the pre-error-correction period in a 2018 paper. Each researcher has a vision for what to pursue first with a machine in the new “fault-tolerant” era.
[Robert] Huang said he would start by running Shor’s algorithm, just to prove that the device works. After that, he said he would try to use it to speed up machine learning — an application to be detailed in coming work.
Most of the architects building quantum computers, whether at Oratomic or other startups, are physicists at heart. They’re interested in physics, not cryptography. Specifically, they’re interested in all the things a computer fluent in the language of quantum mechanics could teach them about the quantum realm, such as what sort of materials might become superconductors even at warm temperatures. Preskill, for his part, would like to simulate the quantum nature of space-time.
The Caltech group knows it has years of work ahead before any of its dreams have a chance of coming true. But the researchers can’t wait to get started. “Pick a cooler life quest than building the world’s first quantum computer with your friends!” said a jubilant Bluvstein, reached by phone shortly before their paper went live, before rushing off to celebrate…
Eminently worth reading in full: “New Advances Bring the Era of Quantum Computers Closer Than Ever,” from @walkingthedot.bsky.social in @quantamagazine.bsky.social.
* David Deutsch, The Fabric of Realityy
###
As we prepare, we might take a moment to appreciate just how vastly and deeply the legacy systems challenged by quantum computing run, recalling that on this date in 1959 Mary Hawes, a computer scientist for the Burroughs Corporation held a meeting of computers users, manufacturers, and academics at the University of Pennsylvania aimed at creating a common business oriented programming language. At the meeting, representative Grace Hopper suggested that they ask the Department of Defense to fund the effort to create such a language. Also attending was Charles Phillips who was director of the Data System Research Staff at the DoD and was excited by the possibility of a common language streamlining their operations. He agreed to sponsor the creation of such a language. This was the genesis of what would eventually become the COBOL language.
To this day COBOL is still the most common programming language used in business, finance, and administrative systems for companies and governments, primarily on mainframe systems, with around 200 billion lines of code still in production use… all of which are in question and/or at risk in a world of quantum computing.
#COBOL #computerSecurity #computers #computing #crypto #cryptocurrency #culture #GraceHopper #history #MaryHawes #quantum #quantumComputing #Science #security #Technology -
“Quantum computation is … nothing less than a distinctly new way of harnessing nature”*…
As the tools in the world around us change, the world– and we– change with them. The onslaught of AI is the change that seems to be grabbing most of our mindshare these days… and with reason. But there are, of course, other changes (in biotech, in materials science, et al.) that are also going to be hugely impactful.
Today, a look at the computing technology stalking up behind AI: quantum computing. As enthusiasts like David Deutsch (author of the quote above) argue, it can have tremendous benefits, perhaps especially in our ability to model (and thus better understand) our reality.
But quantum computing will, if/when it arrives, also present huge challenges to us as individuals and as societies– perhaps most prominently in its threat to the ways in which we protect our systems and our information: We’ve felt pretty safe for decades, secure in the knowledge that we could lose passwords to phising or hacks, but that it would take the “classical” computers we have 1 billion years to break today’s RSA-2048 encryption. A quantum computer could crack it in as little as a hundred seconds.
The technology has been “somewhere on the horizon” for 30 years… so not something that has seemed urgent to confront. But progress has accelerated; a recent Google paper reports on a programming and architectural breakthrough that greatly reduces the computing resources necessary to break classical cryptography… putting the prospect of “Q-Day” (the point at which quantum computers become powerful enough to break standard encryption methods (RSA, ECC), endangering global digital security) much closer, which would put everything from crypto-wallets to our e-banking accounts at risk.
Charlie Wood brings us up to speed…
Some 30 years ago, the mathematician Peter Shor took a niche physics project — the dream of building a computer based on the counterintuitive rules of quantum mechanics — and shook the world.
Shor worked out a way for quantum computers to swiftly solve a couple of math problems that classical computers could complete only after many billions of years. Those two math problems happened to be the ones that secured the then-emerging digital world. The trustworthiness of nearly every website, inbox, and bank account rests on the assumption that these two problems are impossible to solve. Shor’s algorithm proved that assumption wrong.
For 30 years, Shor’s algorithm has been a security threat in theory only. Physicists initially estimated that they would need a colossal quantum machine with billions of qubits — the elements used in quantum calculations — to run it. That estimate has come down drastically over the years, falling recently to a million qubits. But it has still always sat comfortably beyond the modest capabilities of existing quantum computers, which typically have just hundreds of qubits.
However, two different groups of researchers have just announced advances that notably reduce the gap between theoretical estimates and real machines. A star-studded team of quantum physicists at the California Institute of Technology went public with a design for a quantum computer that could break encryption with only tens of thousands of qubits and said that it had formed a company to build the machine. And researchers at Google announced that they had developed an implementation of Shor’s algorithm that is ten times as efficient as the best previous method.
Neither company has the hardware to break encryption today. But the results underscore what some quantum physicists had already come to suspect: that powerful quantum computers may be years away, rather than decades. “If you care about privacy or you have secrets, then you better start looking for alternatives,” said Nikolas Breuckmann, a mathematical physicist at the University of Bristol, who did not work on either of the papers.
While the new results may provide a jolt for the policymakers and corporations that guard our digital infrastructure, they also signal the rapid progress that physicists have made toward building machines that will let them more thoroughly explore the quantum world.
“We’re going to actually do this,” said Dolev Bluvstein, a Caltech physicist and CEO of the new company, Oratomic…
[Wood unpacks the history of the development of the technology and explores the challenges that remain; he concludes…]
… If any group succeeds at building a quantum computer that can realize Shor’s algorithm, it will mark the end an era — specifically, the “Noisy Intermediate Scale Quantum” era, as Preskill dubbed the pre-error-correction period in a 2018 paper. Each researcher has a vision for what to pursue first with a machine in the new “fault-tolerant” era.
[Robert] Huang said he would start by running Shor’s algorithm, just to prove that the device works. After that, he said he would try to use it to speed up machine learning — an application to be detailed in coming work.
Most of the architects building quantum computers, whether at Oratomic or other startups, are physicists at heart. They’re interested in physics, not cryptography. Specifically, they’re interested in all the things a computer fluent in the language of quantum mechanics could teach them about the quantum realm, such as what sort of materials might become superconductors even at warm temperatures. Preskill, for his part, would like to simulate the quantum nature of space-time.
The Caltech group knows it has years of work ahead before any of its dreams have a chance of coming true. But the researchers can’t wait to get started. “Pick a cooler life quest than building the world’s first quantum computer with your friends!” said a jubilant Bluvstein, reached by phone shortly before their paper went live, before rushing off to celebrate…
Eminently worth reading in full: “New Advances Bring the Era of Quantum Computers Closer Than Ever,” from @walkingthedot.bsky.social in @quantamagazine.bsky.social.
* David Deutsch, The Fabric of Realityy
###
As we prepare, we might take a moment to appreciate just how vastly and deeply the legacy systems challenged by quantum computing run, recalling that on this date in 1959 Mary Hawes, a computer scientist for the Burroughs Corporation held a meeting of computers users, manufacturers, and academics at the University of Pennsylvania aimed at creating a common business oriented programming language. At the meeting, representative Grace Hopper suggested that they ask the Department of Defense to fund the effort to create such a language. Also attending was Charles Phillips who was director of the Data System Research Staff at the DoD and was excited by the possibility of a common language streamlining their operations. He agreed to sponsor the creation of such a language. This was the genesis of what would eventually become the COBOL language.
To this day COBOL is still the most common programming language used in business, finance, and administrative systems for companies and governments, primarily on mainframe systems, with around 200 billion lines of code still in production use… all of which are in question and/or at risk in a world of quantum computing.
#COBOL #computerSecurity #computers #computing #crypto #cryptocurrency #culture #GraceHopper #history #MaryHawes #quantum #quantumComputing #Science #security #Technology -
“Quantum computation is … nothing less than a distinctly new way of harnessing nature”*…
As the tools in the world around us change, the world– and we– change with them. The onslaught of AI is the change that seems to be grabbing most of our mindshare these days… and with reason. But there are, of course, other changes (in biotech, in materials science, et al.) that are also going to be hugely impactful.
Today, a look at the computing technology stalking up behind AI: quantum computing. As enthusiasts like David Deutsch (author of the quote above) argue, it can have tremendous benefits, perhaps especially in our ability to model (and thus better understand) our reality.
But quantum computing will, if/when it arrives, also present huge challenges to us as individuals and as societies– perhaps most prominently in its threat to the ways in which we protect our systems and our information: We’ve felt pretty safe for decades, secure in the knowledge that we could lose passwords to phising or hacks, but that it would take the “classical” computers we have 1 billion years to break today’s RSA-2048 encryption. A quantum computer could crack it in as little as a hundred seconds.
The technology has been “somewhere on the horizon” for 30 years… so not something that has seemed urgent to confront. But progress has accelerated; a recent Google paper reports on a programming and architectural breakthrough that greatly reduces the computing resources necessary to break classical cryptography… putting the prospect of “Q-Day” (the point at which quantum computers become powerful enough to break standard encryption methods (RSA, ECC), endangering global digital security) much closer, which would put everything from crypto-wallets to our e-banking accounts at risk.
Charlie Wood brings us up to speed…
Some 30 years ago, the mathematician Peter Shor took a niche physics project — the dream of building a computer based on the counterintuitive rules of quantum mechanics — and shook the world.
Shor worked out a way for quantum computers to swiftly solve a couple of math problems that classical computers could complete only after many billions of years. Those two math problems happened to be the ones that secured the then-emerging digital world. The trustworthiness of nearly every website, inbox, and bank account rests on the assumption that these two problems are impossible to solve. Shor’s algorithm proved that assumption wrong.
For 30 years, Shor’s algorithm has been a security threat in theory only. Physicists initially estimated that they would need a colossal quantum machine with billions of qubits — the elements used in quantum calculations — to run it. That estimate has come down drastically over the years, falling recently to a million qubits. But it has still always sat comfortably beyond the modest capabilities of existing quantum computers, which typically have just hundreds of qubits.
However, two different groups of researchers have just announced advances that notably reduce the gap between theoretical estimates and real machines. A star-studded team of quantum physicists at the California Institute of Technology went public with a design for a quantum computer that could break encryption with only tens of thousands of qubits and said that it had formed a company to build the machine. And researchers at Google announced that they had developed an implementation of Shor’s algorithm that is ten times as efficient as the best previous method.
Neither company has the hardware to break encryption today. But the results underscore what some quantum physicists had already come to suspect: that powerful quantum computers may be years away, rather than decades. “If you care about privacy or you have secrets, then you better start looking for alternatives,” said Nikolas Breuckmann, a mathematical physicist at the University of Bristol, who did not work on either of the papers.
While the new results may provide a jolt for the policymakers and corporations that guard our digital infrastructure, they also signal the rapid progress that physicists have made toward building machines that will let them more thoroughly explore the quantum world.
“We’re going to actually do this,” said Dolev Bluvstein, a Caltech physicist and CEO of the new company, Oratomic…
[Wood unpacks the history of the development of the technology and explores the challenges that remain; he concludes…]
… If any group succeeds at building a quantum computer that can realize Shor’s algorithm, it will mark the end an era — specifically, the “Noisy Intermediate Scale Quantum” era, as Preskill dubbed the pre-error-correction period in a 2018 paper. Each researcher has a vision for what to pursue first with a machine in the new “fault-tolerant” era.
[Robert] Huang said he would start by running Shor’s algorithm, just to prove that the device works. After that, he said he would try to use it to speed up machine learning — an application to be detailed in coming work.
Most of the architects building quantum computers, whether at Oratomic or other startups, are physicists at heart. They’re interested in physics, not cryptography. Specifically, they’re interested in all the things a computer fluent in the language of quantum mechanics could teach them about the quantum realm, such as what sort of materials might become superconductors even at warm temperatures. Preskill, for his part, would like to simulate the quantum nature of space-time.
The Caltech group knows it has years of work ahead before any of its dreams have a chance of coming true. But the researchers can’t wait to get started. “Pick a cooler life quest than building the world’s first quantum computer with your friends!” said a jubilant Bluvstein, reached by phone shortly before their paper went live, before rushing off to celebrate…
Eminently worth reading in full: “New Advances Bring the Era of Quantum Computers Closer Than Ever,” from @walkingthedot.bsky.social in @quantamagazine.bsky.social.
* David Deutsch, The Fabric of Reality
###
As we prepare, we might take a moment to appreciate just how vastly and deeply the legacy systems challenged by quantum computing run, recalling that on this date in 1959 Mary Hawes, a computer scientist for the Burroughs Corporation held a meeting of computers users, manufacturers, and academics at the University of Pennsylvania aimed at creating a common business oriented programming language. At the meeting, representative Grace Hopper suggested that they ask the Department of Defense to fund the effort to create such a language. Also attending was Charles Phillips who was director of the Data System Research Staff at the DoD and was excited by the possibility of a common language streamlining their operations. He agreed to sponsor the creation of such a language. This was the genesis of what would eventually become the COBOL language.
To this day COBOL is still the most common programming language used in business, finance, and administrative systems for companies and governments, primarily on mainframe systems, with around 200 billion lines of code still in production use… all of which are in question and/or at risk in a world of quantum computing.
#COBOL #computerSecurity #computers #computing #crypto #cryptocurrency #culture #GraceHopper #history #MaryHawes #quantum #quantumComputing #Science #security #Technology -
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI
-
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI
-
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI
-
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI
-
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI
-
Ugh! Even after the 18.7.7 update, #Apple *still* nags you to “upgrade” to #iOS v26 though. 😒
Tim Apple, I *don’t* want that silly #LiquidGlass abomination. ✋🏽🙅🏽♂️
#Security #UX #ComputerSecurity #iPhone #iPad #DarkSword #Design #Nags #Nagging
-
True that:
“Every Dependency You Add Is A Supply Chain Attack Waiting To Happen”, Ben Hoyt (https://benhoyt.com/writings/dependencies/).
Via Lobsters: https://lobste.rs/s/j6uemk/every_dependency_you_add_is_supply_chain
On HN: https://news.ycombinator.com/item?id=47613210
#Security #Dependencies #Programming #SupplyChainAttacks #ComputerSecurity
-
Memory Dump Analysis Anthology, Revised Edition: The First 5 Volumes by Dmitry Vostokov is the featured bundle on Leanpub!
Link: https://leanpub.com/b/mdaa
#CAndCpp #ComputerHardware #ComputerSecurity #Testing #Resiliency #SoftwareArchitecture #SoftwareEngineering #ComputerScience #Dotnet #Devops #OperatingSystemDevelopment #DigitalForensics #Software
-
🔓 Ξέχασες τον κωδικό root στο Linux; 😅
Ολοκληρωμένος οδηγός για να επαναφέρετε το συνθηματικό! 🐧
✅ @debian
✅ @ubuntu / Linux Mint
✅ @fedora / RHEL / CentOS / Rocky
✅ @opensuse
✅ @archlinux👉 Διαβάστε το πλήρες άρθρο εδώ: https://eiosifidis.blogspot.com/2026/01/epanafora-pasword-root.html
#Linux #SysAdmin #RootPassword #TechSupport #OpenSource #Debian #Ubuntu #Fedora #CentOS #ArchLinux #SUSE #TechGuide #HowTo #ComputerSecurity #Privacy #FOSS #AdminLife #Tech
-
CISM: The Last Mile: Your guide to the finish line https://leanpub.com/cismlastmile by Pete Zerger is the featured book on the Leanpub homepage! https://leanpub.com #ComputerSecurity #books #CISM #ISACA #cybersecurity
Find it on Leanpub!
-
Computer Security Fundamentals by Nastaran Nazar Zadeh, 2025
This book aims to provide a thorough understanding of the fundamental concepts of computer security. Topics include cryptography, network security, malware, and risk management. The book also addresses emerging threats and the latest security technologies.
#books
#nonfiction
#textbook
#ComputerSecurity
#cybersecurity -
CISM: The Last Mile: Your guide to the finish line https://leanpub.com/cismlastmile by Pete Zerger is the featured book on the Leanpub homepage! https://leanpub.com #ComputerSecurity #books #CISM
Find it on Leanpub!
-
PhantomRaven Attack Exploits NPM’s Unchecked HTTP URL Dependency Feature https://hackaday.com/2025/10/30/phantomraven-attack-exploits-npms-unchecked-http-url-dependency-feature/ #computersecurity #SecurityHacks #News #NPM
-
PhantomRaven Attack Exploits NPM’s Unchecked HTTP URL Dependency Feature - An example of RDD in a package’s dependencies list. It’s not even counted as a ‘re... - https://hackaday.com/2025/10/30/phantomraven-attack-exploits-npms-unchecked-http-url-dependency-feature/ #computersecurity #securityhacks #news #npm
-
Computer viruses are more like bacterial or parasite infections than viral infections.
#computersecurity #infectiousdiseases #computerviruses #viruses #parasites #bacterialinfections #viralinfections #trojans #computing -
Senators Demand Answers From Mark Zuckerberg on WhatsApp Security - Three Republican senators sent a letter to Meta’s chief executive on Wednesday asking him... - https://www.nytimes.com/2025/09/10/technology/whatsapp-senators-letter-meta.html #computersecurity #metaplatformsinc #whistle-blowers #zuckerbergmarke #baigattaullah #whatsappinc #censorship
-
Whistle-Blower Sues Meta Over Claims of WhatsApp Security Flaws - In a lawsuit filed Monday, the former head of security for the messaging app accused the ... - https://www.nytimes.com/2025/09/08/technology/whatsapp-whistleblower-lawsuit.html #workplacehazardsandviolations #suitsandlitigation(civil) #mobileapplications #computersecurity #metaplatformsinc #whistle-blowers #zuckerbergmarke #attaullahbaig #socialmedia #whatsappinc #privacy
-
ChatGPT Will Get Parental Controls and New Safety Features, OpenAI Says - After a California teenager spent months on ChatGPT discussing plans to end his life, Ope... - https://www.nytimes.com/2025/09/02/technology/personaltech/chatgpt-parental-controls-openai.html #suicidesandsuicideattempts #suitsandlitigation(civil) #mentalhealthanddisorders #teenagersandadolescence #artificialintelligence #computersecurity #openailabs #parenting #chatgpt
-
WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices https://gbhackers.com/whatsapp-zero-day-vulnerability-exploited-with-0-click-attacks/ #VulnerabilityAnalysis #CyberSecurityNews #computersecurity #Vulnerabilities #cybersecurity #Vulnerability #WhatsApp #Apple
-
Google Will Require Developer Verification Even for Sideloading https://hackaday.com/2025/08/26/google-will-require-developer-verification-even-for-sideloading/ #computersecurity #AndroidHacks #sideload #android #News
-
Google Will Require Developer Verification Even for Sideloading - Do you like writing software for Android, perhaps even sideload the occasional APK... - https://hackaday.com/2025/08/26/google-will-require-developer-verification-even-for-sideloading/ #computersecurity #androidhacks #sideload #android #news
-
New “ToolShell” Exploit Targets SharePoint Servers for Full Takeover https://gbhackers.com/new-toolshell-exploit-targets-sharepoint-servers/ #CVE/vulnerability #CyberSecurityNews #ExploitationTools #computersecurity #Vulnerabilities #Vulnerability #Tools
-
What to Know About the Hack at Tea, an App Where Women Share Red Flags About Men - A data breach exposed photos and ID cards of women who signed up for a fast-growing app f... - https://www.nytimes.com/2025/07/26/us/tea-safety-dating-app-hack.html #thursday(honeypotdatingltd) #datingandrelationships #cyberattacksandhackers #identificationdevices #mobileapplications #teadatingadviceinc #computersecurity #womenandgirls #socialmedia
-
Strava Fitness App Revealed Locations of Swedish Leaders - Secret meetings and private holidays of the royal family and prime minister were inadvert... - https://www.nytimes.com/2025/07/11/world/europe/strava-sweden-bodyguards-prime-minister.html #securityandwarningsystems #mobileapplications #computersecurity #kristerssonulf #royalfamilies #akessonjimmie #stravainc #privacy #sweden
-
NSO Group Ordered to Pay Meta $167 Million in Damages - Meta had sued the firm, NSO Group, for using its spyware to hack 1,400 WhatsApp accounts ... - https://www.nytimes.com/2025/05/06/technology/nso-meta-damages-whatsapp.html #surveillanceofcitizensbygovernment #compensationfordamages(law) #computersandtheinternet #cyberwarfareanddefense #cyberattacksandhackers #mobileapplications #computersecurity #metaplatformsinc #instagraminc #socialmedia #facebookinc #whatsappinc #nsogroup
-
Finally updated my #profile at https://speakerinnen.org :awesome:
Are you looking for a #talk, a #workshop or an #interview on the #socialimpact of #digitalization?
On #ai, #sustainability or #ideologies behind digitalization as #cybernetics, #gamification, #longtermism, or #effectivealtruism?
Why the thoughts and theories of those in power heavily influence societies?
Are you looking for a #workshop on how to really interest people in #computersecurity?
Contact me.
And #boost if you like
-
Finally updated my #profile at https://speakerinnen.org :awesome:
Are you looking for a #talk, a #workshop or an #interview on the #socialimpact of #digitalization?
On #ai, #sustainability or #ideologies behind digitalization as #cybernetics, #gamification, #longtermism, or #effectivealtruism?
Why the thoughts and theories of those in power heavily influence societies?
Are you looking for a #workshop on how to really interest people in #computersecurity?
Contact me.
And #boost if you like
-
Finally updated my #profile at https://speakerinnen.org :awesome:
Are you looking for a #talk, a #workshop or an #interview on the #socialimpact of #digitalization?
On #ai, #sustainability or #ideologies behind digitalization as #cybernetics, #gamification, #longtermism, or #effectivealtruism?
Why the thoughts and theories of those in power heavily influence societies?
Are you looking for a #workshop on how to really interest people in #computersecurity?
Contact me.
And #boost if you like
-
Finally updated my #profile at https://speakerinnen.org :awesome:
Are you looking for a #talk, a #workshop or an #interview on the #socialimpact of #digitalization?
On #ai, #sustainability or #ideologies behind digitalization as #cybernetics, #gamification, #longtermism, or #effectivealtruism?
Why the thoughts and theories of those in power heavily influence societies?
Are you looking for a #workshop on how to really interest people in #computersecurity?
Contact me.
And #boost if you like
-
Finally updated my #profile at https://speakerinnen.org :awesome:
Are you looking for a #talk, a #workshop or an #interview on the #socialimpact of #digitalization?
On #ai, #sustainability or #ideologies behind digitalization as #cybernetics, #gamification, #longtermism, or #effectivealtruism?
Why the thoughts and theories of those in power heavily influence societies?
Are you looking for a #workshop on how to really interest people in #computersecurity?
Contact me.
And #boost if you like
-
The Future of Authentication: Moving Beyond Passwords https://gbhackers.com/the-future-of-authentication-moving-beyond-passwords/ #passwordlessauthentication #CyberSecurityNews #computersecurity #cybersecurity #Password #CISO
-
CISM: The Last Mile: Your guide to the finish line https://leanpub.com/cismlastmile by Pete Zerger is the featured book on the Leanpub homepage! https://leanpub.com #ComputerSecurity #books #ebooks #CISM
This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective.
Find it on Leanpub!
-
How the Crypto Exchange Bybit Lost $1.5 Billion to North Korean Hackers - The cryptocurrency exchange Bybit lost $1.5 billion to North Korean hackers last month — ... - https://www.nytimes.com/2025/03/06/technology/bybit-crypto-hack-north-korea.html #regulationandderegulationofindustry #bankingandfinancialinstitutions #computersandtheinternet #cyberattacksandhackers #robberiesandthefts #computersecurity #virtualcurrency #bybitfintechltd #lazarusgroup #socialmedia #singapore #benzhou
-
Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access https://gbhackers.com/fortinet-fortios-fortiproxy-zero-day/ #VulnerabilityAnalysis #CVE/vulnerability #CyberSecurityNews #computersecurity #Vulnerability #cybersecurity #ZeroDay
-
In trying to make sense of the #wrecking ball that is #ElonMusk and Trump’s #DOGE, helpful to think about Evil Housekeeper Problem. It’s a principle of #computersecurity roughly stating that once someone is in your hotel room with your laptop, all bets are off. Because the intruder has physical access, you are in much more trouble. And the person demanding to get into your #computer may be standing right beside you. #natsec #security #IT #networks https://www.technologyreview.com/2025/02/07/1111283/elon-musk-doge-and-the-evil-housekeeper-problem-government-technology/ #CFPB #financialsystem
-
Excellent:
“Against /tmp”, Tony Finch (https://dotat.at/@/2024-10-22-tmp.html).
Via Lobsters: https://lobste.rs/s/esmju4/against_tmp
On HN: https://news.ycombinator.com/item?id=41913610
#Tmp #Temp #Unix #Security #ComputerSecurity #Files #Directories #TemporaryFiles
-
Excellent:
“Against /tmp”, Tony Finch (https://dotat.at/@/2024-10-22-tmp.html).
Via Lobsters: https://lobste.rs/s/esmju4/against_tmp
On HN: https://news.ycombinator.com/item?id=41913610
#Tmp #Temp #Unix #Security #ComputerSecurity #Files #Directories #TemporaryFiles
-
Cash App Users May Claim Up to $2,500 in Data Breach Settlement - A proposed $15 million settlement stipulates that account holders can file for losses rel... - https://www.nytimes.com/2024/08/09/business/cash-app-settlement.html #compensationfordamages(law) #mobilecommerceandpayments #cashapp(mobileapp) #computersecurity #unitedstates #blockinc
-
OpenAI Says It Has Begun Training a New Flagship A.I. Model - The advanced A.I. system would succeed GPT-4, which powers ChatGPT. The company has also ... - https://www.nytimes.com/2024/05/28/technology/openai-gpt4-new-model.html #copyrightsandcopyrightviolations #computersandtheinternet #rumorsandmisinformation #artificialintelligence #boardsofdirectors #computersecurity #altmansamuelh #sutskeverilya #dangeloadam #openailabs #start-ups #chatgpt