article thumbnail

Long Article on GM Spying on Its Cars’ Drivers

Schneier on Security

Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.

Insurance 334
article thumbnail

Important Update: Vulnerability Articles Now Exclusive to Supporters

Penetration Testing

Access to Vulnerability Reports Now Requires Support At SecurityOnline.info, we are committed to providing high-quality, independent reporting on The post Important Update: Vulnerability Articles Now Exclusive to Supporters appeared first on Daily CyberSecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hiding Prompt Injections in Academic Papers

Schneier on Security

Academic papers were found to contain hidden instructions to LLMs: It discovered such prompts in 17 articles, whose lead authors are affiliated with 14 institutions including Japan’s Waseda University, South Korea’s KAIST, China’s Peking University and the National University of Singapore, as well as the University of Washington and (..)

335
335
article thumbnail

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

Schneier on Security

It all seems to have come from this news article , which wasn’t bad but was taken widely out of proportion. The headline is pretty scary: “ China’s Quantum Computer Scientists Crack Military-Grade Encryption.” ” No, it’s not true. This debunking saved me the trouble of writing one.

article thumbnail

Signal Blocks Windows Recall

Schneier on Security

This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.

Risk 247
article thumbnail

Ubuntu Disables Spectre/Meltdown Protections

Schneier on Security

News article. For these reasons, we feel that Spectre mitigations in Compute Runtime no longer offer enough security impact to justify the current performance tradeoff. I agree with this trade-off. These attacks are hard to get working, and it’s not easy to exfiltrate useful data. There are way easier ways to attack systems.

Malware 267
article thumbnail

Social Engineering to Disable iMessage Protections

Schneier on Security

One article claims that this trick has been popular since last summer. So—this is the new bit—the messages said something like: “Please reply Y, then exit the text message, reopen the text message activation link, or copy the link to Safari browser to open it.” Everyone has now adopted this new trick.