Remove book-a-call
article thumbnail

Technology and Policymakers

Schneier on Security

He called them sciences and humanities, and pointed to the split as a major hindrance to solving the world's problems. Technology is now deeply intertwined with policy. It's all changing fast; technology is literally creating the world we all live in, and policymakers can't keep up. Today, it's a crisis. Today, it's a crisis.

article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Seek security policies and technologies that enhance society broadly rather than benefit special interests. It’s interesting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Philosophy and Technology Combine for Better Endpoint Security

Security Boulevard

When Ackoff wrote his article, computing technology was at the cusp of data and information. With the advent of advanced tools like big data analytics and artificial intelligence, one might make a bold statement that today, computing technology straddles the gap between information and knowledge. Let’s start with a use case.

article thumbnail

Body Found in Canada Identified as Neo-Nazi Spam King

Krebs on Security

A key subject of the book Spam Kings by Brian McWilliams , Hawke was a Jewish-born American who’d legally changed his name from Andrew Britt Greenbaum. ” The book’s “about the author” page said James was a “disruptive technology pioneer” who was into rock climbing and was a resident of Squamish.

Banking 347
article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call. The reader spoke on condition that their name not be used in this story, so for the sake of simplicity we’ll call him Doug. Sure, Doug said, here’s my Calendly profile, book a time and we’ll do it then.

Malware 253
article thumbnail

Details of the Cloud Hopper Attacks

Schneier on Security

Reuters has a long article on the Chinese government APT attack called Cloud Hopper. Yet the campaign ensnared at least six more major technology firms, touching five of the world's 10 biggest tech service providers. It was much bigger than originally reported. The hacking campaign, known as "Cloud Hopper," was the subject of a U.S.

article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

It stacks an adversarial meta-task onto a seq2seq model, backpropagates the desired meta-task output to points in the word-embedding space we call “pseudo-words,” and uses pseudo-words to shift the entire output distribution of the seq2seq model. Model spinning introduces a “meta-backdoor” into a model.

Media 225