article thumbnail

On Technologies for Automatic Facial Recognition

Schneier on Security

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference.

article thumbnail

The Ramifications of Ukraine’s Drone Attack

Schneier on Security

Here’s an article from last year about the cost of drones versus the cost of top-of-the-line fighter jets. And then we can add in drone-coordinating technologies like swarming. There’s a balance between the cost of the thing, and the cost to destroy the thing, and that balance is changing dramatically.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AIs and Robots Should Sound Robotic

Schneier on Security

This technology will replace humans in many areas. Now we can use that same technology to make robotic speech that is indistinguishable from human sound robotic again. The first clip is an AI-generated “podcast” of this article made by Google’s NotebookLM featuring two AI “hosts.”

article thumbnail

The Independent Op-Ed: Australia’s social media ban won’t protect kids – it’ll put them more at risk

Joseph Steinberg

Australia recently enacted legislation to ban children under 16 from using social media a policy that the Australian government plans to enforce through the use of untested age-verification technology.

Media 277
article thumbnail

Hacking Automobile Keyless Entry Systems

Schneier on Security

Suspected members of a European car-theft ring have been arrested : The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away. The article doesn’t say how the hacking tool got installed into cars.

Hacking 363
article thumbnail

On the Zero-Day Market

Schneier on Security

This Article accounts for and critiques these failures, providing a socio-technical history since 2014, particularly focusing on the conversation about trade in zero-day vulnerabilities and exploits. Second, this Article applies lessons from these failures to guide regulatory efforts going forward.

Marketing 330
article thumbnail

Navigating cyberthreatsand strengthening defensesin the era of AI

Doctor Chaos

Microsoft recently posted an article speaking to this concern found HERE. Everybody is racing to develop an AI strategy, and many do not understand the risks associated with AI.