-
Cognitive Passwords – What Are They?
Another really simple analogy for these cognitive passwords is the classic “Safe Word”. Settle down now, I’m talking about that conversation you have with your children when they reach an appropriate age, wherein you agree upon a safe word or phrase that any stranger the child has never met must repeat if they are to…
-
Pit Boss Grills Scams on Facebook
Take a few extra moments to examine the source before falling for an expensive scam.
-
Bootkit zero-day fix – is this Microsoft’s most cautious patch ever?
CAUTION Once the mitigation for this issue is enabled on a device, meaning the revocations have been applied, it cannot be reverted if you continue to use Secure Boot on that device. Even reformatting of the disk will not remove the revocations if they have already been applied.
-
AI-GENERATED: A Hacker Breaking Into a Home Computer
So I typed in: “a hacker breaking into a home computer.”
-
How Nvidia’s CUDA Monopoly In Machine Learning Is Breaking – OpenAI Triton And PyTorch 2.0
Over the last decade, the landscape of machine learning software development has undergone significant changes. Many frameworks have come and gone, but most have relied heavily on leveraging Nvidia’s CUDA and performed best on Nvidia GPUs. However, with the arrival of PyTorch 2.0 and OpenAI’s Triton, Nvidia’s dominant position in this field, mainly due to…
-
WSL2 Includes X Server Support!
I was today-years-old when I discovered Windows Subsystem for Linux release 2 supports X-windows.
-
A Brand New YouTube Channel
Yes that’s right! I’ve got a brand new YouTube channel with precisely ONE video published! Welcome to the random. I’ll post largely Information Security and/or Technology-related videos sporadically. C’mon in, the water’s fine!
-
About Rapid Security Responses for iOS, iPadOS, and macOS
Rapid Security Responses deliver important security improvements between software updates.
-
You Are Safe! (Are You Sure?)
Bottom line, and I’m not necessarily bagging on Bitdefender, is that password protected files are skipped, and without regularly reviewing your logs, you may have no idea whatsoever they’re being skipped. Personally, my preference would be to immediately quarantine ANY password protected file encountered and require manual restoration. Trust – but VERIFY! Bitdefender is a…
-
Vehicle Controller Area Network Attacks
Vice is running an interesting article on Car Thieves Using Tech Disguised Inside Old Nokia Phones and Bluetooth Speakers. They detail the weaponization of theft with European hackers selling some twenty-dollars-worth of components in a unit for anywhere between a few hundred dollars to a few thousand. This allows folks with essentially no prior knowledge…
-
Justice Dept. will investigate leak of classified Pentagon documents
This may take some time given the wide number of folks with access, but someone is probably going to jail over it:https://www.msn.com/en-us/news/us/justice-dept-will-investigate-leak-of-classified-pentagon-documents/ar-AA19BjV6
-
‘Find My iPhone’ app mistake causing angry residents to come to his house
https://abc13.com/richmond-news-find-my-iphone-app-apple-technology-mistake-lost-items-at-home/13085661/ This story very much reminds me of a prior geo-ip issue:https://www.theguardian.com/technology/2016/aug/09/maxmind-mapping-lawsuit-kansas-farm-ip-address
-
How thieves steal cars using network bus
It starts with a headlamp and fake smart speaker, and ends in an injection attack and a vanished motor. Read more: https://www.theregister.com/2023/04/06/can_injection_attack_car_theft
-
Replacing Passwords with Passphrases
Replacing passwords with passphrases is a good way to increase the security of your accounts, as passphrases are longer and more complex than typical passwords.