article thumbnail

AIs Hacking Websites

Schneier on Security

New research : LLM Agents can Autonomously Hack Websites Abstract: In recent years, large language models (LLMs) have become increasingly capable and can now interact with tools (i.e., Namely, we show that GPT-4 is capable of such hacks, but existing open-source models are not.

Hacking 314
article thumbnail

China Surveillance Company Hacked

Schneier on Security

I-Soon sells hacking and espionage services to Chinese national and local government. And they seem to primarily be hacking regionally. Last week, someone posted something like 570 files, images and chat logs from a Chinese company called I-Soon. Lots of details in the news articles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Automobile Keyless Entry Systems

Schneier on Security

The article doesn’t say how the hacking tool got installed into cars. A fraudulent tool—marketed as an automotive diagnostic solution, was used to replace the original software of the vehicles, allowing the doors to be opened and the ignition to be started without the actual key fob.

Hacking 353
article thumbnail

Spyware Vendor Hacked

Schneier on Security

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several security vulnerabilities that allowed them to compromise WebDetetive’s servers and access its user databases.

Spyware 316
article thumbnail

NationalPublicData.com Hack Exposes a Nation’s Data

Krebs on Security

We’ll also take a closer look at the data broker that got hacked — a background check company founded by an actor and retired sheriff’s deputy from Florida. This post examines what we know about a breach that has exposed hundreds of millions of consumer records. In 2019, malicious hackers stole data on more than 1.5

Hacking 352
article thumbnail

Hacking Scientific Citations

Schneier on Security

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors’ names, publication year, journal or conference name, and page numbers of the cited publication.

Hacking 345
article thumbnail

Hacking the High School Grading System

Schneier on Security

Interesting New York Times article about high-school students hacking the grading system. ” It’s a basic math hack. I know this is a minor thing in the universe of problems with secondary education and grading, but I found the hack interesting. What’s not helping? A teacher from Chapel Hill, N.C.,

Hacking 290