No big surprise here. Researchers have gotten full read and write access to Meta’s Bloom, Meta-Llama and Pythia large language models in a typical example of supply chain risk. If they had been hackers or a non-friendly nation, they could have poisoned the training data, stolen the models and datasets and other unfriendly things. AI […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Montana and Indiana TikTok Ban Stunts Unsurprisingly Fail in Court Both Indiana and Montana passed laws completely banning TikTok – both at the app store and private citizen level. Given that these laws were political stunts designed to try and impress voters, it is not surprising that they failed in court. The courts struck down […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We have long reported that hackers love to break into law firms. This is in part due to the fact that many law firms do not have good cybersecurity practices, especially small firms. The other part is that breaking into a law firm is like winning the lottery. Instead of getting one customer’s data, they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hackers are advertising a service on the encrypted, Russian, messaging app Telegram that would let you buy a full identity for between $8 and $40. In crypto. The company, USiSLookups, a play on the data broker USInfoSearch, allows you to look up virtually anyone. In just a few moments. The Telegram channel includes a small […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While basically unenforceable, the agreement is a starting point. The US, UK and 23 domestic and international cybersecurity organizations, representing more than a dozen countries, signed on to the Guidelines for Secure AI Development. The Guidelines, complementing theĀ U.S. Voluntary Commitments on Ensuring Safe, Secure, and Trustworthy AI, provide essential recommendations for AI system development and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]