Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Photos of a person in disguise — wearing glasses, a head covering, and scarf — with the points of the face detected by a new artificial intelligence face recognition system noted in the center and rightmost image of this photograph. | Image Credit: Amarjot Singh, et al.

Trouble Ahead: AI Identifies Humans →

September 13, 2017 by Marc Handelman in All is Information, Identity, Artificial Intelligence

With a paucity of data, I might add...

September 13, 2017 /Marc Handelman
All is Information, Identity, Artificial Intelligence

Facebookery - Cough It Up →

September 12, 2017 by Marc Handelman in All is Information, Voting Security, Facebookery, Propaganda, National Security

Sam Biddle's outstanding thought piece targeting the political shenanigans at Facebook, Inc. (NasdaqGS: FB) (published at The Intercept), doesn't pull any punches in his story of corruption and stupidity at the highest levels at the company; and remarkably, this time they are in the proverbial cahoots with those highly efficient Russkiye (русские)! HatTip Kudos to Trey Blalock of Firewall Consultants and Verification Labs!

"Last week, after what must have been a series of extremely grim meetings in Menlo Park, Facebook admitted publicly that part of its revenue includes what appears to be politically motivated fraud undertaken by a shady Russian company. " - via Sam Biddle on The Intercept

September 12, 2017 /Marc Handelman
All is Information, Voting Security, Facebookery, Propaganda, National Security

The Voice Assistant Gambit →

September 11, 2017 by Marc Handelman in All is Information, Alternate Attack Vectors, Alternate Attack Analysis, Physical Security, Information Security, Signals, Communication Security, Communications, Hardware Flaws, Hardware Security

Nicole Kobie, writing at New Scientist, tells the tale of newly researched voice assistant attack vectors leveraging signalling flaws (via an ultrasound attack) within both Apple Inc.'s (NasdaqGS: AAPL) and Amazon.com Inc.'s (NasdaqGS: AMZN) voice assitant offerings Siri and Alexa, respectively. The 'Dominoe Effect' of the ultrasound flaws in these products/services traverses down the device foodchain to Alexa and soo-to-be Siri enabled third party devices... Perhaps new protective sound generating devices are in order?

All Amazon and Apple Links in this Post are Non-affiliate

September 11, 2017 /Marc Handelman
All is Information, Alternate Attack Vectors, Alternate Attack Analysis, Physical Security, Information Security, Signals, Communication Security, Communications, Hardware Flaws, Hardware Security

TED 2017 - Noriko Arai's 'Can A Robot Pass A University Entrance Exam" →

September 06, 2017 by Marc Handelman in All is Information, Artificial Intelligence, Artificial Irony
September 06, 2017 /Marc Handelman
All is Information, Artificial Intelligence, Artificial Irony

TED 2017 - Cathy O'Neils' 'The Era of Blind Faith in Big Data Must End' →

September 05, 2017 by Marc Handelman in All is Information, Data That Is Big, Data That Wants To Be Big
September 05, 2017 /Marc Handelman
All is Information, Data That Is Big, Data That Wants To Be Big

USENIX Enigma 2017 — Nestan Tsiskaridze's 'Leveraging the Power of Automated Reasoning in Security Analysis of Web Applications and Beyond' →

September 01, 2017 by Marc Handelman in All is Information, Alternate Attack Analysis, AI Security, Conferences, Data That Is Big, Data Driven Security, Education, Information Security, Machine Learning

This is a joint work with Clark Barrett (NYU/Stanford University), Morgan Deters (NYU), Tianyi Liang (The University of Iowa), Andrew Reynolds (The University of Iowa/EPFL), Cesare Tinelli (The University of Iowa) and Nestan Tsiskaridze, University of California, Santa Barbara.

September 01, 2017 /Marc Handelman
All is Information, Alternate Attack Analysis, AI Security, Conferences, Data That Is Big, Data Driven Security, Education, Information Security, Machine Learning

USENIX Enigma 2017 — Tudor Dumitras' 'FeatureSmith: Learning to Detect Malware by Mining the Security Literature' →

August 31, 2017 by Marc Handelman in Alternate Attack Analysis, All is Information, Conferences, Education, Information Security, Malware, Malware Detection, Data Mining, Data Driven Security, Data Discovery
August 31, 2017 /Marc Handelman
Alternate Attack Analysis, All is Information, Conferences, Education, Information Security, Malware, Malware Detection, Data Mining, Data Driven Security, Data Discovery

USENIX Enigma 2017 — Emily Schechter's 'Inside 'MOAR TLS...' →

August 29, 2017 by Marc Handelman in All is Information, Conferences, Education, TLS, Network Security, Information Security, USENIX
August 29, 2017 /Marc Handelman
All is Information, Conferences, Education, TLS, Network Security, Information Security, USENIX

Cybersecurity Vulnerabilities to Artificial Intelligence →

August 29, 2017 by Marc Handelman in All is Information, Artificial Irony, Cybersecurity, Must Read

The Council on Foreign Relations has published an superlative thought piece - written by Adam Segal - targeting security implications to artificial intelligence. Today's Must Read.

"Facebook CEO Mark Zuckerberg and Tesla CEO Elon Musk recently fought over whether artificial intelligence (AI) posed an existential threat to humanity. Musk made the case AI machines could eventually become self-aware and dispose of their human masters, like in the movie Ex Machina, whereas Zuckerberg argued humanity had nothing to fear." via a blog posting written by Adam Segal for the Council on Foreign Relations

Attribution: "Adam Segal is the Maurice R. Greenberg Senior Fellow for China Studies and Director of the Digital and Cyberspace Policy Program at the the Council on Foreign Relations. He is author of The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (New York, NY: Public Affairs, 2016)." via the Council on Foreign Relations

August 29, 2017 /Marc Handelman
All is Information, Artificial Irony, Cybersecurity, Must Read

PECB, Karsten Decker's 'Information Security – Risk Identification Is All' →

August 27, 2017 by Marc Handelman in Risk, Risk Management, Risk Identification, All is Information, Conferences, Education, Information Security

From Karsten Decker's 'Information Security - Risk Identification Is All' video description:

(Karsten Decker) The Owner and the CEO of Decker Consulting GmbH, talked about risk identification and information security. He elaborated these topics through three important questions. 1. What is information security risk? 2. Why is it important? , and 3. What is crucial for its success?

PECB Insights Conference - where experts meet! To see the presentation slides: https://pecb.com/conferences/previous-events/pecb-insights-conference-2017/presentations/

For more: https://pecb.com/conferences/ https://pecb.com/

August 27, 2017 /Marc Handelman
Risk, Risk Management, Risk Identification, All is Information, Conferences, Education, Information Security

PECB, Juris Puce's 'Effects of Artificial Intelligence on Information Security' →

August 26, 2017 by Marc Handelman in All is Information, Artificial Intelligence, Information Security

From Juris' video description:

During the PECB Insights Conference, Juris Puce, the co-founder of 4SmartStreets, gave a brief presentation on the effects of Artificial intelligence. His presentation was illustrated with real life case scenarios on the impact of artificial intelligence on information security and personal data protection. PECB Insights Conference - Where experts meet!

To see the presentation slides: https://pecb.com/conferences/previous-events/pecb-insights-conference-2017/presentations/

For more: https://pecb.com/conferences/ https://pecb.com/

August 26, 2017 /Marc Handelman
All is Information, Artificial Intelligence, Information Security

USENIX Enigma 2017 — Damian Menscher's 'Drawing the Foul: Operation of a DDoS Honeypot'

August 23, 2017 by Marc Handelman in All is Information, Conferences, USENIX, Network Security, Information Security, Honeypots, DDoS, Education
August 23, 2017 /Marc Handelman
All is Information, Conferences, USENIX, Network Security, Information Security, Honeypots, DDoS, Education

USENIX Enigma 2017 — Lt. Col. Tim Booher's 'Understanding and Securing DoD Weapon Systems ' →

August 22, 2017 by Marc Handelman in All is Information, Conferences, Information Security, Infrastructure, USENIX, US DARPA, Physical Security, US DOD
August 22, 2017 /Marc Handelman
All is Information, Conferences, Information Security, Infrastructure, USENIX, US DARPA, Physical Security, US DOD

Macie the Discoverer →

August 21, 2017 by Marc Handelman in All is Information, Automation, DBMS Security, Database Security, Data Security, Data That Is Big, Data Loss Prevention, Data Driven Security, Information Security, Security Inventions, Security Architecture, Security Automation, Data Discovery

News that Macie The Discoverer has arrived in your S3 bucket... Data Security Automation - potentially - at it's finest? You be the judge.

August 21, 2017 /Marc Handelman
All is Information, Automation, DBMS Security, Database Security, Data Security, Data That Is Big, Data Loss Prevention, Data Driven Security, Information Security, Security Inventions, Security Architecture, Security Automation, Data Discovery

DEF CON 24, Robert Anderson's 'US Interrogation Techniques and Social Interrogation'

August 19, 2017 by Marc Handelman in Information Security, Interrogation, All is Information, Conferences, Education, Veterans, US Army, US Armed Forces, Social Engineering
August 19, 2017 /Marc Handelman
Information Security, Interrogation, All is Information, Conferences, Education, Veterans, US Army, US Armed Forces, Social Engineering

DEF CON 25 - Fran Brown & David Latimer's 'Game of Drones' →

August 16, 2017 by Marc Handelman in All is Information, Conferences, Education, Drones, Hardware Security, Hardware Flaws
August 16, 2017 /Marc Handelman
All is Information, Conferences, Education, Drones, Hardware Security, Hardware Flaws

Wire, Barbed →

August 16, 2017 by Marc Handelman in All is Information, Common Sense, Communication Security, Communications, Information Security, Telecom

The telecom of the 19th century North American West. via Kottke. In-built physical security, easy propagation, no need to duplicate the medium. Signals traversed easily, good conductivity, low(ish) resistance, what more did they (i.e, we) need?

August 16, 2017 /Marc Handelman
All is Information, Common Sense, Communication Security, Communications, Information Security, Telecom

The Disingenuous →

August 15, 2017 by Marc Handelman in All is Information, Data That Is Big, Data Security, Data Leakage, Data Driven Security, Information Security

Do you unequivocally trust iRobot with your personal data, including internal mapping of your home? Read this post to learn more.

August 15, 2017 /Marc Handelman
All is Information, Data That Is Big, Data Security, Data Leakage, Data Driven Security, Information Security

DEF CON 25, Dan Petro's & Ben Morris' 'Weaponizing Machine Learning' →

August 15, 2017 by Marc Handelman in All is Information, Alternate Attack Vectors, Conferences, Brilliant, Education, Information Security, Machine Learning
August 15, 2017 /Marc Handelman
All is Information, Alternate Attack Vectors, Conferences, Brilliant, Education, Information Security, Machine Learning

DEF CON 25, Max Bazaliy's 'Jailbreaking Apple Watch' →

August 14, 2017 by Marc Handelman in All is Information, Conferences, Hardware Security, Hardware Flaws, Information Security
August 14, 2017 /Marc Handelman
All is Information, Conferences, Hardware Security, Hardware Flaws, Information Security
  • Newer
  • Older