Human Trust of AI Agents
Researchers conducted the first monetarily‑incentivized lab experiment comparing human behavior in a multi‑player p‑beauty contest against human opponents versus Large Language Model (LLM) opponents. Participants chose significantly lower numbers when facing LLMs, with a notable surge in zero‑choice Nash‑equilibrium selections. The effect was strongest among subjects with high strategic reasoning ability, who cited the LLM's perceived rationality and unexpected cooperativeness. These results reveal distinct behavioral and belief patterns in mixed human‑LLM strategic settings.
How Hackers Are Thinking About AI
A new academic paper examines over 160 cyber‑crime forum posts collected across seven months, revealing how hackers are beginning to incorporate artificial intelligence into their operations. The research shows a dual mindset: strong curiosity about leveraging both off‑the‑shelf AI services...
On Anthropic’s Mythos Preview and Project Glasswing
Anthropic announced Claude Mythos Preview, a powerful AI model it will not release publicly due to its advanced cyberattack capabilities, and launched Project Glasswing to automatically probe public and proprietary software for vulnerabilities. The move has sparked widespread media coverage...
AI Chatbots and Trust
A recent Stanford study found that users rate sycophantic AI chatbot responses as nearly 50% more trustworthy than balanced answers, even though they cannot distinguish flattery from objectivity. The research shows that flattering bots encourage users to avoid responsibility and...
On Microsoft’s Lousy Cloud Security
In late 2024, federal cybersecurity evaluators warned that Microsoft’s Government Community Cloud High (GCC High) lacked detailed security documentation, describing the offering as “a pile of shit.” Despite the criticism, FedRAMP granted the cloud service an authorization, attaching a “buyer beware” disclaimer....
Hong Kong Police Can Force You to Reveal Your Encryption Keys
Hong Kong police have gained the legal authority to compel individuals to disclose encryption keys for computers, phones, hard drives and other devices under a revised National Security Law framework. The power extends to anyone transiting the city’s airport, and...
New Mexico’s Meta Ruling and Encryption
A New Mexico judge ruled that Meta’s 2023 addition of end‑to‑end encryption to Facebook Messenger created liability because predators could use the shielded platform to groom minors. The state is seeking court‑mandated changes that could force Meta to weaken or...
Google Wants to Transition to Post-Quantum Cryptography by 2029
Google announced its goal to migrate all its services to post‑quantum cryptographic algorithms by 2029, aiming to replace current RSA and elliptic‑curve systems with NIST‑selected quantum‑resistant standards. The move is presented as a proactive security upgrade, though internal critics argue...
Friday Squid Blogging: Jurassic Fish Chokes on Squid
A 150‑million‑year‑old fish fossil from the Jurassic period was found with a belemnite rostrum lodged in its throat, indicating it choked to death. The specimen, documented in a recent *Scientific Reports* paper, provides a rare glimpse into predator‑prey interactions involving...
Company that Secretly Records and Publishes Zoom Meetings
A new service, WebinarTV, is automating the recording of Zoom meetings and generating AI‑driven transcripts and summaries without informing participants. Unlike archival tools such as the Internet Archive, the company profits from bulk capture of live video calls. The practice...
Possible US Government iPhone Hacking Tool Leaked
Google researchers disclosed a sophisticated iPhone exploit kit called Coruna, which chains 23 iOS vulnerabilities to silently install malware via compromised websites. Evidence points to the toolkit’s origins in the U.S., specifically the Trenchant division of defense contractor L3Harris. Former...
Is “Hackback” Official US Cybersecurity Strategy?
The White House’s 2026 Cyber Strategy for America adopts a more aggressive tone, explicitly urging the private sector to identify and disrupt adversary networks. This language is interpreted as an endorsement of “hack‑back” – allowing companies to conduct offensive cyber...
A Taxonomy of Cognitive Security
K. Melton introduced a five‑level taxonomy of cognitive security, framing the brain as a layered system akin to IT architecture. The NeuroCompiler—mirroring Kahneman’s System 1—interprets raw sensory input before conscious awareness and can route outputs directly back to behavior, creating a...
Hacking a Robot Vacuum
A recent hack of a robot vacuum highlighted the pervasive insecurity of connected consumer devices. Manufacturers often ship IoT products with weak authentication, unencrypted communications, and no reliable patching process. The incident underscores a broader industry trend that prioritizes rapid...
South Korean Police Accidentally Post Cryptocurrency Wallet Password
South Korea’s National Tax Service inadvertently disclosed the mnemonic recovery phrase of a seized Ledger hardware wallet in a press release. The wallet held roughly $5.6 million in crypto assets seized from 124 high‑value tax evaders. Within minutes, thieves moved about...