Tag: external links
-
Breaking into Cybersecurity
Breaking in to the Cybersecurity industry can be difficult, but certainly not impossible.
-
How Nvidia’s CUDA Monopoly In Machine Learning Is Breaking – OpenAI Triton And PyTorch 2.0
Over the last decade, the landscape of machine learning software development has undergone significant changes. Many frameworks have come and gone, but most have relied heavily on leveraging Nvidia’s CUDA and performed best on Nvidia GPUs. However, with the arrival of PyTorch 2.0 and OpenAI’s Triton, Nvidia’s dominant position in this field, mainly due to…
-
Vehicle Controller Area Network Attacks
Vice is running an interesting article on Car Thieves Using Tech Disguised Inside Old Nokia Phones and Bluetooth Speakers. They detail the weaponization of theft with European hackers selling some twenty-dollars-worth of components in a unit for anywhere between a few hundred dollars to a few thousand. This allows folks with essentially no prior knowledge…
-
Justice Dept. will investigate leak of classified Pentagon documents
This may take some time given the wide number of folks with access, but someone is probably going to jail over it:https://www.msn.com/en-us/news/us/justice-dept-will-investigate-leak-of-classified-pentagon-documents/ar-AA19BjV6
-
‘Find My iPhone’ app mistake causing angry residents to come to his house
https://abc13.com/richmond-news-find-my-iphone-app-apple-technology-mistake-lost-items-at-home/13085661/ This story very much reminds me of a prior geo-ip issue:https://www.theguardian.com/technology/2016/aug/09/maxmind-mapping-lawsuit-kansas-farm-ip-address
-
How thieves steal cars using network bus
It starts with a headlamp and fake smart speaker, and ends in an injection attack and a vanished motor. Read more: https://www.theregister.com/2023/04/06/can_injection_attack_car_theft