article thumbnail

On Technologies for Automatic Facial Recognition

Schneier on Security

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference.

article thumbnail

AIs and Robots Should Sound Robotic

Schneier on Security

This technology will replace humans in many areas. Now we can use that same technology to make robotic speech that is indistinguishable from human sound robotic again. The first clip is an AI-generated “podcast” of this article made by Google’s NotebookLM featuring two AI “hosts.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Independent Op-Ed: Australia’s social media ban won’t protect kids – it’ll put them more at risk

Joseph Steinberg

Australia recently enacted legislation to ban children under 16 from using social media a policy that the Australian government plans to enforce through the use of untested age-verification technology.

Media 277
article thumbnail

On the Zero-Day Market

Schneier on Security

This Article accounts for and critiques these failures, providing a socio-technical history since 2014, particularly focusing on the conversation about trade in zero-day vulnerabilities and exploits. Second, this Article applies lessons from these failures to guide regulatory efforts going forward.

Marketing 335
article thumbnail

Hacking Automobile Keyless Entry Systems

Schneier on Security

Suspected members of a European car-theft ring have been arrested : The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away. The article doesn’t say how the hacking tool got installed into cars.

Hacking 362
article thumbnail

CyberSecurity Is Not Enough: Businesses Must Insure Against Cyber Losses

Joseph Steinberg

Note: In an article that I am writing together with Mark Lynd, Head of Digital Business at NETSYNC, and that will appear on this website next week, we will discuss some of the important Considerations when purchasing cyber insurance.

Insurance 364
article thumbnail

NIST Releases First Post-Quantum Encryption Algorithms

Schneier on Security

EDITED TO ADD: Good article : One – ML-KEM [PDF] (based on CRYSTALS-Kyber) – is intended for general encryption, which protects data as it moves across public networks. My recent writings on post-quantum cryptographic standards. NIST plans to select one or two of these algorithms by the end of 2024.