Remove machines
article thumbnail

Smuggling Gold by Disguising it as Machine Parts

Schneier on Security

It was disguised as machine parts: On March 27, customs officials x-rayed two air compressors and discovered that they contained gold that had been “concealed in the integral parts” of the compressors. Someone got caught trying to smuggle 322 pounds of gold (that’s about 1/4 of a cubic foot) out of Hong Kong.

249
249
article thumbnail

Credible Handwriting Machine

Schneier on Security

In case you don’t have enough to worry about, someone has built a credible handwriting machine: This is still a work in progress, but the project seeks to solve one of the biggest problems with other homework machines, such as this one that I covered a few months ago after it blew up on social media.

Media 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inserting a Backdoor into a Machine-Learning System

Schneier on Security

Interesting research: “ ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks , by Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, and Robert Mullins: Abstract : Early backdoor attacks against machine learning set off an arms race in attack and defence development.

article thumbnail

The Future of Machine Learning and Cybersecurity

Schneier on Security

The Center for Security and Emerging Technology has a new report: “ Machine Learning and Cybersecurity: Hype and Reality.” ” Here’s the bottom line: The report offers four conclusions: Machine learning can help defenders more accurately detect and triage potential attacks.

article thumbnail

The Machine Learning Cybersecurity Revolution

Security Boulevard

Balancing the promise and pitfalls of machine learning cybersecurity The integration of machine learning (ML) has opened up new frontiers for defending against complex and evolving cyber threats. However, machine learning cybersecurity integration is not without its challenges.

article thumbnail

Attacking the Performance of Machine Learning Systems

Schneier on Security

We show how adversaries can exploit carefully-crafted sponge examples, which are inputs designed to maximise energy consumption and latency, to drive machine learning (ML) systems towards their worst-case performance. Sponge examples are, to our knowledge, the first denial-of-service attack against the ML components of such systems.

312
312
article thumbnail

Machine-Learning Python package compromised in supply chain attack

Tech Republic Security

A nightly build version of a machine-learning framework dependency has been compromised. The post Machine-Learning Python package compromised in supply chain attack appeared first on TechRepublic. The package ran malicious code on affected systems and stole data from unsuspecting users.

206
206