article thumbnail

On Technologies for Automatic Facial Recognition

Schneier on Security

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference.

article thumbnail

On the Zero-Day Market

Schneier on Security

This Article accounts for and critiques these failures, providing a socio-technical history since 2014, particularly focusing on the conversation about trade in zero-day vulnerabilities and exploits. Second, this Article applies lessons from these failures to guide regulatory efforts going forward.

Marketing 301
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Automobile Keyless Entry Systems

Schneier on Security

Suspected members of a European car-theft ring have been arrested : The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away. The article doesn’t say how the hacking tool got installed into cars.

Hacking 353
article thumbnail

CyberSecurity Is Not Enough: Businesses Must Insure Against Cyber Losses

Joseph Steinberg

Note: In an article that I am writing together with Mark Lynd, Head of Digital Business at NETSYNC, and that will appear on this website next week, we will discuss some of the important Considerations when purchasing cyber insurance.

Insurance 364
article thumbnail

Three cybercrime technology trends to watch in 2023

CyberSecurity Insiders

Spy”-type cyberspace race as both criminals and defenders vie to gain the upper hand using new and emerging technologies. Every technology that enables our cyber teams to pinpoint and resolve threats and prevent attacks more quickly and accurately also benefits cybercriminals.

article thumbnail

Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies

Tech Republic Security

Cyber threat hunting combines strategies, advanced technologies and skilled analysts to methodically examine networks, endpoints and data repositories. This TechRepublic Premium article, written by Franklin Okeke, aims to look at threat hunting.

article thumbnail

Bluetooth Flaw Allows Remote Unlocking of Digital Locks

Schneier on Security

Although Khan demonstrated the hack on a 2021 Tesla Model Y, NCC Group said any smart locks using BLE technology, including residential smart locks, could be unlocked in the same way. Another news article.