article thumbnail

New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. Insiders call this cognitive electronic warfare ). It's hard to tell what this thing can do.

article thumbnail

GUEST ESSAY: Understanding the security limits of the static and dynamic passwords we rely on

The Last Watchdog

For better or worse, we will continue to use passwords to access our computing devices and digital services for years to come. With fast advancements in computer technology, it has become possible to crack static passwords using, in essence, brute force. Artificial intelligence systems. We all rely on passwords.

Passwords 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware: 8 Things That You Must Know

Joseph Steinberg

Most ransomware strains can block you from accessing your files, and involve criminals either (a) encrypting your files and demanding a ransom in exchange for the relevant decryption keys, or (b) removing your files, or portions thereof, from your computing devices, and demanding a ransom in exchange for returning your electronic property.

article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

The word deepfake, which originates from a combination of the terms “deep learning” and “fake,” refers to digital audio/video products created through artificial intelligence (AI) that could allow one to impersonate an individual with likeness and voice during a video conversation.

article thumbnail

On the Need for an AI Public Option

Schneier on Security

Artificial intelligence will bring great benefits to all of humanity. It requires upward of $100 million in computational costs for a single model training run, in addition to access to large amounts of data. billion federal investment in computing and data resources to prime the AI research ecosystem in the United States.

article thumbnail

Building Trustworthy AI

Schneier on Security

Amid the myriad warnings about creepy risks to well-being, threats to democracy , and even existential doom that have accompanied stunning recent developments in artificial intelligence (AI)—and large language models (LLMs) like ChatGPT and GPT-4 —one optimistic vision is abundantly clear: this technology is useful.

article thumbnail

Securing Success: The Crucial Role of a Cybersecurity Specialist in a Growing Business

Joseph Steinberg

Securing Success: The Crucial Role of a Cybersecurity Specialist in a Growing Business Human society is increasingly dependent on computer systems and the data housed and utilized within IT (information technology) infrastructure.