2017 Security Recap
Cryptographers and Security Researchers have a penchant for coming up with colorful acronyms and names which describe, in brief, the vulnerability or exposure. Some are them are BEAST, CRIME, ShellShock,… Read more »
Cryptographers and Security Researchers have a penchant for coming up with colorful acronyms and names which describe, in brief, the vulnerability or exposure. Some are them are BEAST, CRIME, ShellShock,… Read more »
CVE-2023-48795 describes a prefix truncation attack on the SSH (Secure Shell) protocol. The vulnerability is called Terrapin. Why Terrapin? Terrapin is a small North American turtle (shell, get it?). Reminds… Read more »
ChatGPT 3.5 is amazing, especially for a free product. We hear that ChatGPT can pass the bar exam, medical exam etc. — this is impressive. ChatGPT 3.5 can write code,… Read more »
I asked Bard "Explain LLVM". Bard said (in part) Imagine you have a program written in Python, but you want it to run on a device that only understands C… Read more »
Security is only as good as the weakest link. Example: You have installed a very strong lock on your front door. A potential intruder will look at the strong lock… Read more »