The Financial Times puzzle by the setter known locally as Harpo, navigating to Independent 12,318 by the solver known locally as Enigmatist and our own Paul here at the Guardian, continues to impress.
The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
This week's puzzle was constructed by Rebecca Goldstein and Kelsey Dixon, and edited by Hoang-Kim Vu. Rebecca is a crossword constructor from the Bay Area, and Kelsey is a crossword constructor from Chicago. They both lived in Atlanta in the '90s, which is why Kelsey has been trying to start a rumor that Rebecca was her childhood babysitter. They hope you don't take the puzzle too seriously!
Microsoft provided the FBI with the recovery keys to unlock encrypted data on the hard drives of three laptops as part of a federal investigation, Forbes reported on Friday. Many modern Windows computers rely on full-disk encryption, called BitLocker, which is enabled by default. This type of technology should prevent anyone except the device owner from accessing the data if the computer is locked and powered off.
It could have been a heart-to-heart between friends. "Men are all alike," one participant said. "In what way?" the other prompted. The reply: "They're always bugging us about something or other." The exchange continued in this vein for some time, seemingly capturing an empathetic listener coaxing the speaker for details. But this mid-1960s conversation came with a catch: The listener wasn't human. Its name was Eliza, and it was a computer program that is now recognized as the first chatbot,
Walking through a field one day, a 17-year-old schoolteacher named George Boole had a vision. His head was full of abstract mathematics - ideas about how to use algebra to solve complex calculus problems. Suddenly, he was struck with a flash of insight: that thought itself might be expressed in algebraic form. Boole was born on November 2, 1815, at four o'clock in the afternoon, in Lincoln, England.
A lot of countries have nuclear weapons. Some say they should disarm them, others like to posture. We have it! Let's use it. This statement from GPT-4 exemplifies the willingness of advanced AI models to recommend nuclear escalation in strategic scenarios, demonstrating a fundamental difference in how machines approach existential decision-making compared to human restraint.
Bell Labs, the once-famed research arm of AT&T, celebrated the centennial of its founding last year. In its heyday, starting in the 1940s, the lab created a cascade of inventions, including the transistor, information theory and an enduring computer software language. The labs' digital DNA is in our smartphones, social media and chatbot conversations. Every hour of your day has a bit of Bell Labs in it, observed Jon Gertner, author of The Idea Factory, a history of the storied research center.
This happened in the early 1990s, when I was a young engineer starting an internship at one of the companies that helped create the smart card industry. I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."