Remove about-us our-story
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

The first time I ever wrote publicly about a company's security vulnerabilities, my boss came to have a word with me after seeing my name in the news headlines. When I wrote about how I deal with online abuse, it was off the back of some pretty nasty stuff. With our wedding being only next week, it just felt. Pat Phelan.

InfoSec 359
article thumbnail

Happy 14th Birthday, KrebsOnSecurity!

Krebs on Security

Nor do I wish to hold forth about whatever cyber horrors may await us in 2024. ” I was 23 years old, and I had no clue what to say except to tell him that paper route story, and that I’d already been working for him for half my life. And how to make people the focus of highly technical stories.

Phishing 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Our Security of AI Papers and Blogs Explained

Anton on Security

Moderately relevant AI made image about AI papers :-) steampunk ofc! Recently our team has written several papers and blogs focused on securing AI. experts on this here and they’re not us. What you will not see in these papers is anything to do with robot rebellion or some such long-term potential threats.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I thought about it a lot before agreeing.

article thumbnail

New Zealand Election Fraud

Schneier on Security

According to election spokesperson Laura Keown, the votes were cast using fake email addresses that were all traced back to the same IP address in Auckland, New Zealand’s most populous city. Asked whether Russia had been involved, she denied any “overseas interference” in the vote.

315
315
article thumbnail

Chinese Supply-Chain Attack on Computer Systems

Schneier on Security

Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. The US government has known about it for almost as long, and has tried to keep the attack secret: China’s exploitation of products made by Supermicro, as the U.S. Yes, it’s plausible.

article thumbnail

import alignment: A Library-based Approach to AI Alignment

Daniel Miessler

There is much being said right now about the AI Alignment Problem. There’s more to it, but it’s essentially the question of how to keep AI from destroying us when it wakes up. Russell argues that we need uncertainty built into our alignment efforts. Here’s a first pass. We’ll assume the latter.