Tag: conference
-
More on Rewiring Democracy
It’s been a month since Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship was published. From what we know, sales are good. Some of the book’s forty-three chapters are available online: chapters 2, 12, 28, 34, 38, and 41. We need more reviews”, six on Amazon is not enough, and no one…
-
More on Rewiring Democracy
It’s been a month since Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship was published. From what we know, sales are good. Some of the book’s forty-three chapters are available online: chapters 2, 12, 28, 34, 38, and 41. We need more reviews”, six on Amazon is not enough, and no one…
-
NDSS 2025 THEMIS: Regulating Textual Inversion For Personalized Concept Censorship
Tags: ai, backdoor, business, conference, Internet, malicious, network, regulation, technology, threat, trainingSESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for Science, Technology and Research (A*STAR), Singapore), Florian Kerschbaum (University of Waterloo), Tianwei Zhang (Nanyang Technological University) ———– PAPER THEMIS: Regulating Textual Inversion for Personalized Concept Censorship Personalization has become a…
-
NDSS 2025 A Key-Driven Framework For Identity-Preserving Face Anonymization
SESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai University) ———– PAPER A Key-Driven Framework for Identity-Preserving Face Anonymization Virtual faces are crucial content in the metaverse. Recently, attempts have been made to generate virtual faces…
-
NDSS 2025 THEMIS: Regulating Textual Inversion For Personalized Concept Censorship
Tags: ai, backdoor, business, conference, Internet, malicious, network, regulation, technology, threat, trainingSESSION Session 3D: Al Safety ———– ———– Authors, Creators & Presenters: Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for Science, Technology and Research (A*STAR), Singapore), Florian Kerschbaum (University of Waterloo), Tianwei Zhang (Nanyang Technological University) ———– PAPER THEMIS: Regulating Textual Inversion for Personalized Concept Censorship Personalization has become a…
-
This Hacker Conference Installed a Literal Anti-Virus Monitoring System
At New Zealand’s Kawaiican cybersecurity convention, organizers hacked together a way for attendees to track CO2 levels throughout the venue”, even before they arrived. First seen on wired.com Jump to article: www.wired.com/story/this-hacker-conference-installed-a-literal-anti-virus-monitoring-system/
-
Windows 11 gets new Cloud Rebuild, PointTime Restore tools
Microsoft announced two new Windows 11 recovery features today at the Ignite developer conference, called Cloud Rebuild and Point-in-Time Restore (PITR), that aim to reduce downtime and make it easier to recover from system failures or faulty updates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-11-gets-new-cloud-rebuild-point-in-time-restore-tools/
-
Windows 11 gets new Cloud Rebuild, PointTime Restore tools
Microsoft announced two new Windows 11 recovery features today at the Ignite developer conference, called Cloud Rebuild and Point-in-Time Restore (PITR), that aim to reduce downtime and make it easier to recover from system failures or faulty updates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-11-gets-new-cloud-rebuild-point-in-time-restore-tools/
-
Windows 11 gets new Cloud Rebuild, PointTime Restore tools
Microsoft announced two new Windows 11 recovery features today at the Ignite developer conference, called Cloud Rebuild and Point-in-Time Restore (PITR), that aim to reduce downtime and make it easier to recover from system failures or faulty updates. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-11-gets-new-cloud-rebuild-point-in-time-restore-tools/
-
India Outlines Its Global Digital Future and Cybersecurity Vision at WTDC-25
At the High-Level Segment of the World Telecommunication Development Conference (WTDC-25), India presented a vision for a sustainable and inclusive global digital future, noting collective responsibility in strengthening cybersecurity and expanding equitable digital access. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/india-global-digital-future/
-
NDSS 2025 Heimdall: Towards Risk-Aware Network Management Outsourcing
SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Yuejie Wang (Peking University), Qiutong Men (New York University), Yongting Chen (New York University Shanghai), Jiajin Liu (New York University Shanghai), Gengyu Chen (Carnegie Mellon University), Ying Zhang (Meta), Guyue Liu (Peking University), Vyas Sekar (Carnegie Mellon University) PAPER PAPER Heimdall: Towards Risk-Aware Network Management…
-
NDSS 2025 Incorporating Gradients To Rules
SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: ingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI (Zhejiang University), R. Sekar (Stony Brook University), Han Liu (Northwestern University), Yan Chen (Northwestern University) PAPER Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection As cyber attacks grow increasingly…
-
NDSS 2025 Power-Related Side-Channel Attacks Using The Android Sensor Framework
SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Mathias Oberhuber (Graz University of Technology), Martin Unterguggenberger (Graz University of Technology), Lukas Maar (Graz University of Technology), Andreas Kogler (Graz University of Technology), Stefan Mangard (Graz University of Technology) PAPER Power-Related Side-Channel Attacks using the Android Sensor Framework Software-based power side-channel attacks are a…
-
NDSS 2025 Power-Related Side-Channel Attacks Using The Android Sensor Framework
SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Mathias Oberhuber (Graz University of Technology), Martin Unterguggenberger (Graz University of Technology), Lukas Maar (Graz University of Technology), Andreas Kogler (Graz University of Technology), Stefan Mangard (Graz University of Technology) PAPER Power-Related Side-Channel Attacks using the Android Sensor Framework Software-based power side-channel attacks are a…
-
NDSS 2025 Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
Tags: attack, china, conference, data-breach, dns, firewall, injection, Internet, monitoring, network, privacy, risk, side-channel, update, vulnerabilitySESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab), Jade Sheffey (UMass Amherst), David Fifield (None), Amir Houmansadr (UMass Amherst), Elson Wedwards (None), Eric Wustrow (University of Colorado Boulder) PAPER Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of…
-
NDSS 2025 MALintent: Coverage Guided Intent Fuzzing Framework For Android
Tags: android, api, conference, framework, google, Internet, network, open-source, oracle, privacy, vulnerabilitySESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), Taesoo Kim (Georgia Institute of Technology) PAPER MALintent: Coverage Guided Intent Fuzzing Framework for Android Intents are the primary…
-
Techtalk: Strategische Partnerschaft von Delinea und Telekom Security lässt Kunden profitieren
Tags: conferenceDer Sicherheitsanbieter Delinea und Telekom Security sind erst vor kurzem eine strategische Partnerschaft eingegangen. Warum das für beide Unternehmen wichtig ist und was die jeweilige Kundschaft davon hat, darüber haben wir uns auf dem Security-Event it-sa 2025 mit Aldo Izard Gosch und Andreas Müller ausgetauscht. Herausgekommen ist dieses knapp 3-minütige Videointerview. First seen on ap-verlag.de…
-
Techtalk: Strategische Partnerschaft von Delinea und Telekom Security lässt Kunden profitieren
Tags: conferenceDer Sicherheitsanbieter Delinea und Telekom Security sind erst vor kurzem eine strategische Partnerschaft eingegangen. Warum das für beide Unternehmen wichtig ist und was die jeweilige Kundschaft davon hat, darüber haben wir uns auf dem Security-Event it-sa 2025 mit Aldo Izard Gosch und Andreas Müller ausgetauscht. Herausgekommen ist dieses knapp 3-minütige Videointerview. First seen on ap-verlag.de…
-
Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation
A surge in online casino spam is reshaping the dark corners of the internet, with threat actors increasingly hacking websites to embed malicious SEO-boosting links. This evolving tactic aims to promote online gambling sites by hijacking the authority of legitimate websites putting site owners and unsuspecting users alike at risk. Historically, blackhat SEO spam campaigns…
-
Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation
A surge in online casino spam is reshaping the dark corners of the internet, with threat actors increasingly hacking websites to embed malicious SEO-boosting links. This evolving tactic aims to promote online gambling sites by hijacking the authority of legitimate websites putting site owners and unsuspecting users alike at risk. Historically, blackhat SEO spam campaigns…
-
NDSS 2025 Investigating The Susceptibility Of Teens And Adults To YouTube Giveaway Scams
SESSION Session 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Elijah Bouma-Sims (Carnegie Mellon University), Lily Klucinec (Carnegie Mellon University), Mandy Lanyon (Carnegie Mellon University), Julie Downs (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University) PAPER The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams Fraudsters…
-
NDSS 2025 Qualitative Study On Boards’ Cybersecurity Risk Decision Making
Tags: ciso, conference, cyber, cybersecurity, data-breach, fraud, Internet, network, phishing, risk, strategySESSION Session 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse (Ruhr University Bochum, University College London) PAPER “Where Are We On Cyber?” – A Qualitative Study On Boards’ Cybersecurity Risk Decision Making Boards are increasingly required to oversee the cybersecurity…
-
NDSS 2025 SCAMMAGNIFIER: Piercing The Veil Of Fraudulent Shopping Website Campaigns
SESSION Session 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Marzieh Bitaab (Arizona State University), Alireza Karimi (Arizona State University), Zhuoer Lyu (Arizona State University), Adam Oest (Amazon), Dhruv Kuchhal (Amazon), Muhammad Saad (X Corp.), Gail-Joon Ahn (Arizona State University), Ruoyu Wang (Arizona State University), Tiffany Bao (Arizona State University), Yan Shoshitaishvili (Arizona State…
-
NDSS 2025 SCAMMAGNIFIER: Piercing The Veil Of Fraudulent Shopping Website Campaigns
SESSION Session 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Marzieh Bitaab (Arizona State University), Alireza Karimi (Arizona State University), Zhuoer Lyu (Arizona State University), Adam Oest (Amazon), Dhruv Kuchhal (Amazon), Muhammad Saad (X Corp.), Gail-Joon Ahn (Arizona State University), Ruoyu Wang (Arizona State University), Tiffany Bao (Arizona State University), Yan Shoshitaishvili (Arizona State…
-
NDSS 2025 YuraScanner: Leveraging LLMs For Task-driven Web App Scanning4+
SESSION Session 2B: Web Security Authors, Creators & Presenters: Aleksei Stafeev (CISPA Helmholtz Center for Information Security), Tim Recktenwald (CISPA Helmholtz Center for Information Security), Gianluca De Stefano (CISPA Helmholtz Center for Information Security), Soheil Khodayari (CISPA Helmholtz Center for Information Security), Glancarlo Pellegrino (CISPA Helmholtz Center for Information Security) PAPER YuraScanner: Leveraging LLMs for…
-
NDSS 2025 YuraScanner: Leveraging LLMs For Task-driven Web App Scanning4+
SESSION Session 2B: Web Security Authors, Creators & Presenters: Aleksei Stafeev (CISPA Helmholtz Center for Information Security), Tim Recktenwald (CISPA Helmholtz Center for Information Security), Gianluca De Stefano (CISPA Helmholtz Center for Information Security), Soheil Khodayari (CISPA Helmholtz Center for Information Security), Glancarlo Pellegrino (CISPA Helmholtz Center for Information Security) PAPER YuraScanner: Leveraging LLMs for…
-
NDSS 2025 YuraScanner: Leveraging LLMs For Task-driven Web App Scanning4+
SESSION Session 2B: Web Security Authors, Creators & Presenters: Aleksei Stafeev (CISPA Helmholtz Center for Information Security), Tim Recktenwald (CISPA Helmholtz Center for Information Security), Gianluca De Stefano (CISPA Helmholtz Center for Information Security), Soheil Khodayari (CISPA Helmholtz Center for Information Security), Glancarlo Pellegrino (CISPA Helmholtz Center for Information Security) PAPER YuraScanner: Leveraging LLMs for…
-
NDSS 2025 The (Un)usual Suspects Studying Reasons For Lacking Updates In WordPress
SESSION Session 2B: Web Security Authors, Creators & Presenters: Maria Hellenthal (CISPA Helmholtz Center for Information Security), Lena Gotsche (CISPA Helmholtz Center for Information Security), Rafael Mrowczynski (CISPA Helmholtz Center for Information Security), Sarah Kugel (Saarland University), Michael Schilling (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security) PAPER The…
-
NDSS 2025 The (Un)usual Suspects Studying Reasons For Lacking Updates In WordPress
SESSION Session 2B: Web Security Authors, Creators & Presenters: Maria Hellenthal (CISPA Helmholtz Center for Information Security), Lena Gotsche (CISPA Helmholtz Center for Information Security), Rafael Mrowczynski (CISPA Helmholtz Center for Information Security), Sarah Kugel (Saarland University), Michael Schilling (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security) PAPER The…
-
TechTAlk: G DATA kümmert sich verstärkt um das Berufsbild der IT-Sicherheit
Was bedeutet eigentlich das Thema digitale Souveränität für einen Sicherheitsanbieter wie G DATA CyberDefense, und was konkret tut das Unternehmen für mehr und besser ausgebildete Sicherheitsexperten? Darüber haben wir uns mit Andreas Lüning, einem der Gründer von G DATA, auf der it-sa 2025 unterhalten. Herausgekommen ist dieses gut zweiminütige Video. First seen on ap-verlag.de Jump…

