article thumbnail

New US Electronic Warfare Platform

Schneier on Security

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks.the Silent Crow pod is now the leading contender for the flying flagship of the Army's rebuilt electronic warfare force. Insiders call this cognitive electronic warfare ). It's hard to tell what this thing can do.

article thumbnail

GUEST ESSAY: Understanding the security limits of the static and dynamic passwords we rely on

The Last Watchdog

For better or worse, we will continue to use passwords to access our computing devices and digital services for years to come. With fast advancements in computer technology, it has become possible to crack static passwords using, in essence, brute force. Artificial intelligence systems. We all rely on passwords.

Passwords 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the Need for an AI Public Option

Schneier on Security

Artificial intelligence will bring great benefits to all of humanity. It requires upward of $100 million in computational costs for a single model training run, in addition to access to large amounts of data. billion federal investment in computing and data resources to prime the AI research ecosystem in the United States.

article thumbnail

Five Interesting Israeli CyberSecurity Companies

Joseph Steinberg

About 15 years ago, when I mentioned in a talk that hackers would soon be able to manipulate treatment devices, modify imaging and test results , modify patient records, and take operating room computers offline , several members of the audience told me that I was paranoid.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Related: How Multi Party Computation is disrupting encrypti on An accomplished violinist, Einstein, no doubt, appreciated the symmetry of his metaphor. Allen School of Computer Science & Engineering — puts us one step closer to a working iO prototype. Sahai recently gave this presentation outlining the technical aspects.

Software 182
article thumbnail

Securing Success: The Crucial Role of a Cybersecurity Specialist in a Growing Business

Joseph Steinberg

Securing Success: The Crucial Role of a Cybersecurity Specialist in a Growing Business Human society is increasingly dependent on computer systems and the data housed and utilized within IT (information technology) infrastructure.

article thumbnail

Malware Training Sets: FollowUP

Security Affairs

On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning). I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. Pierluigi Paganini.

Malware 101