Sorry, this is going to be a bit convoluted, so try to stay with me. First we had encryption. Things were good. Encryption was based on mathematically hard problems and computers could not do the math, even in, potentially, a hundred thousand years. Then came Quantum computing. Or at least it is coming. Or maybe […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Veracode makes software that tests your software for vulnerabilities. Software developers use Veracode’s product to see if their software is vulnerable. Here is some information based on scanning over one million applications: Veracode says that AI-Generated code brings security bugs at scale and will likely add to security or technical debt. AI tools might also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI. I hear that it is a thing these days. In order for that to work, companies need to have data to train their software on. Continuously new data. What better way to do that than to use the data that you already have collected from your customers. Some companies are quietly changing their privacy […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FCC Bans Robocalls Using AI-Generated Voices This comes after someone generated thousands of robocalls pretending to be Joe Biden telling people not to vote. Unless they get express permission from the recipient of the call, which would, of course, defeat the purpose of the call. The FCC wrote the rule in a way that allows […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
U.S. Intelligence agencies say that China is shifting tactics. Or, maybe just adding new ones. The NSA, CISA and FBI said, in a joint advisory, that China-backed hackers have maintained access inside U.S. critical infrastructure such as aviation, rail, mass transit, highway, maritime, pipeline, water and sewage to prepare to launch a catastrophic attack at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]