Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Developer Creates Infinite Maze That Traps AI Training Bots

404 Media – “A pseudonymous coder has created and released an open source “tar pit” to indefinitely trap AI training web crawlers in an infinitely, randomly-generating series of pages to waste their time and computing power. The program, called Nepenthes after the genus of carnivorous pitcher plants which trap and consume their prey, can be deployed by webpage owners to protect their own content from being scraped or can be deployed “offensively” as a honeypot trap to waste AI companies’ resources. “It’s less like flypaper and more an infinite maze holding a minotaur, except the crawler is the minotaur that cannot get out. The typical web crawler doesn’t appear to have a lot of logic. It downloads a URL, and if it sees links to other URLs, it downloads those too. Nepenthes generates random links that always point back to itself – the crawler downloads those new links. Nepenthes happily just returns more and more lists of links pointing back to itself,” Aaron B, the creator of Nepenthes, told 404 Media. “Of course, these crawlers are massively scaled, and are downloading links from large swathes of the internet at any given time,” they added. “But they are still consuming resources, spinning around doing nothing helpful, unless they find a way to detect that they are stuck in this loop.” Human users can see how Nepenthes works by clicking here, though I must warn that the page loads incredibly slowly (on purpose) and links endlessly to pages that load the same way. It looks like this, in practice…”

PowerSchool hacker claims they stole data of 62 million students

Bleeping Computer: “The hacker who breached education tech giant PowerSchool claimed in an extortion demand that they stole the personal data of 62.4 million students and 9.5 million teachers. PowerSchool is a cloud-based software solutions provider for K-12 schools and districts that provides tools for enrollment, communication, attendance, staff management, learning systems, analytics, and finance.… Continue Reading

AI Mistakes Are Very Different from Human Mistakes

Schneier on Security: “Humans make mistakes all the time. All of us do, every day, in tasks both new and routine. Some of our mistakes are minor and some are catastrophic. Mistakes can break trust with our friends, lose the confidence of our bosses, and sometimes be the difference between life and death. Over the… Continue Reading

4 Cybersecurity Misconceptions to Leave Behind in 2025

The New Stack: “Most people know that cyberthreats lurk around every corner. Be it an opportunistic lone criminal or a hacker with the power of a nation-state behind them, it can feel like the world and its dog want to access your private data. Beyond this, though, how well do people grasp the threat? According… Continue Reading

The Powerful AI Tool That Cops (or Stalkers) Can Use to Geolocate Photos in Seconds

404 Media: “A powerful AI tool can predict with high accuracy the location of photos based on features inside the image itself—such as vegetation, architecture, and the distance between buildings—in seconds, with the company now marketing the tool to law enforcement officers and government agencies. Called GeoSpy, made by a firm called Graylark Technologies out… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, January 18, 2025

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, January 18, 2025 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

FBI Warned Agents It Believes Phone Logs Hacked Last Year

Bloomberg  [unpaywalled] – “FBI leaders have warned that they believe hackers who broke into AT&T Inc.’s system last year stole months of their agents’ call and text logs, setting off a race within the bureau to protect the identities of confidential informants, a document reviewed by Bloomberg News shows. FBI officials told agents across the… Continue Reading

How to Avoid the Top Internet Scams

Wrong Numbers, Fake Invoices, and Catfishing: If you’re online, you’re at risk. “We spoke to three security experts about what you can do to protect yourself…In a video call, Bogdan Botezatu, Bitdefender’s director of threat research, warned that despite the numerous ways scammers go after their targets, spam email remains the most prevalent. Using telemetry… Continue Reading

Open Port Chronicle: What Port 80 Revealed About The Internet

“At RedHunt Labs, we conduct extensive internet-wide studies as part of Project Resonance to stay ahead of the evolving cyberspace and enhance our Attack Surface Management (ASM) platform. This blog highlights our recent research, where we analyzed billions of IP addresses to check for port 80 open, uncovering fascinating insights.  The internet is massive –… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, January 11, 2025

Pete Recommends – Weekly highlights on cyber security issues, January 11, 202 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex… Continue Reading

Here is a list of every app on your phone selling your location data

Via Austin Corbett‬ ‪@austincorbett.bsky.social– Here is a list of every app on your phone selling your location data to advertisers, interested unknown 3rd parties, and the US government. Thanks to 404 Media and @josephcox.bsky.social There are 12, 373 apps on this Google doc as of today – the apps are used by children and adults… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, January 4, 2025

Via LLRX – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and… Continue Reading