Long Article on GM Spying on Its Cars’ Drivers
Schneier on Security
APRIL 26, 2024
Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.
Schneier on Security
APRIL 26, 2024
Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.
Penetration Testing
MAY 25, 2025
Access to Vulnerability Reports Now Requires Support At SecurityOnline.info, we are committed to providing high-quality, independent reporting on The post Important Update: Vulnerability Articles Now Exclusive to Supporters appeared first on Daily CyberSecurity.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
JULY 7, 2025
Academic papers were found to contain hidden instructions to LLMs: It discovered such prompts in 17 articles, whose lead authors are affiliated with 14 institutions including Japan’s Waseda University, South Korea’s KAIST, China’s Peking University and the National University of Singapore, as well as the University of Washington and (..)
Schneier on Security
OCTOBER 22, 2024
It all seems to have come from this news article , which wasn’t bad but was taken widely out of proportion. The headline is pretty scary: “ China’s Quantum Computer Scientists Crack Military-Grade Encryption.” ” No, it’s not true. This debunking saved me the trouble of writing one.
Schneier on Security
MAY 23, 2025
This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.
Schneier on Security
JULY 2, 2025
News article. For these reasons, we feel that Spectre mitigations in Compute Runtime no longer offer enough security impact to justify the current performance tradeoff. I agree with this trade-off. These attacks are hard to get working, and it’s not easy to exfiltrate useful data. There are way easier ways to attack systems.
Schneier on Security
JANUARY 17, 2025
One article claims that this trick has been popular since last summer. So—this is the new bit—the messages said something like: “Please reply Y, then exit the text message, reopen the text message activation link, or copy the link to Safari browser to open it.” Everyone has now adopted this new trick.
Let's personalize your content