Remove 2015 Remove Encryption Remove Surveillance
article thumbnail

How Real Is the Threat of Adversarial AI to Cybersecurity?

SecureWorld News

Google researchers in 2015 showed that an image of a panda could be imperceptibly modified so that a neural network misclassified it as a gibbon, while to the human eye both images are clearly pandas. Combine this with differential privacy and encryption so that models leak minimal information about individual records.

article thumbnail

CBP Wants New Tech to Search for Hidden Data on Seized Phones

WIRED Threat Level

Last year, CBP claims, it did searches on more than 47,000 electronic devices—which is slightly higher than the approximately 41,500 devices it searched in 2023 but a dramatic rise from 2015, when it searched just more than 8,500 devices. The listing was first posted on June 20 and updated on July 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

The Snowden disclosures and the public controversy that followed led Congress in 2015 to end bulk collection and amend the CDR authorities with the adoption of the USA FREEDOM Act (UFA). For a time, the new program seemed to be functioning well. Nonetheless, three issues emerged around the program.

article thumbnail

Evaluating the GCHQ Exceptional Access Proposal

Schneier on Security

Australia, and elsewhere -- argue that the pervasive use of civilian encryption is hampering their ability to solve crimes and that they need the tech companies to make their systems susceptible to government eavesdropping. Levy and Robinson write: In a world of encrypted services, a potential solution could be to go back a few decades.

article thumbnail

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. The flaws reside in a feature named the “XMEye P2P Cloud” that is enabled by default which is used to connect surveillance devices to the cloud infrastructure. Who controls these servers?

article thumbnail

Ferocious Kitten: 6 years of covert surveillance in Iran

SecureList

Ferocious Kitten is an APT group that since at least 2015 has been targeting Persian-speaking individuals who appear to be based in Iran. We were able to trace the implant back to at least 2015, where it also had variants intended to hijack the execution of the Telegram and Chrome applications as a persistence method.

article thumbnail

Unknown FinSpy Mac and Linux versions found in Egypt

Security Affairs

Experts from Amnesty International uncovered a surveillance campaign that targeted Egyptian civil society organizations with a new version of FinSpy spyware. The mobile version of the surveillance software in the first stage of the infection leverages the exploits to get root access. ” reads the Amnesty’s report.

Spyware 145