Close Menu
Ztoog
    What's Hot
    Crypto

    The AI world needs more data transparency and web3 startup Space and Time says it can help

    Mobile

    Best Bluetooth headsets 2024 | Android Central

    Crypto

    Over 157,000 Bitcoin Transactions Are Waiting To Be Confirmed, Here’s The Issue

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      Any wall can be turned into a camera to see around corners

      JD Vance and President Trump’s Sons Hype Bitcoin at Las Vegas Conference

      AI may already be shrinking entry-level jobs in tech, new research suggests

      Today’s NYT Strands Hints, Answer and Help for May 26 #449

      LiberNovo Omni: The World’s First Dynamic Ergonomic Chair

    • Technology

      A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

      Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

      Apple iPhone exports from China to the US fall 76% as India output surges

      Today’s NYT Wordle Hints, Answer and Help for May 26, #1437

      5 Skills Kids (and Adults) Need in an AI World – O’Reilly

    • Gadgets

      Future-proof your career by mastering AI skills for just $20

      8 Best Vegan Meal Delivery Services and Kits (2025), Tested and Reviewed

      Google Home is getting deeper Gemini integration and a new widget

      Google Announces AI Ultra Subscription Plan With Premium Features

      Google shows off Android XR-based glasses, announces Warby Parker team-up

    • Mobile

      Deals: the Galaxy S25 series comes with a free tablet, Google Pixels heavily discounted

      Microsoft is done being subtle – this new tool screams “upgrade now”

      Wallpaper Wednesday: Android wallpapers 2025-05-28

      Google can make smart glasses accessible with Warby Parker, Gentle Monster deals

      vivo T4 Ultra specs leak

    • Science

      Analysts Say Trump Trade Wars Would Harm the Entire US Energy Sector, From Oil to Solar

      Do we have free will? Quantum experiments may soon reveal the answer

      Was Planet Nine exiled from the solar system as a baby?

      How farmers can help rescue water-loving birds

      A trip to the farm where loofahs grow on vines

    • AI

      Rationale engineering generates a compact new tool for gene therapy | Ztoog

      The AI Hype Index: College students are hooked on ChatGPT

      Learning how to predict rare kinds of failures | Ztoog

      Anthropic’s new hybrid AI model can work on tasks autonomously for hours at a time

      AI learns how vision and sound are connected, without human intervention | Ztoog

    • Crypto

      GameStop bought $500 million of bitcoin

      CoinW Teams Up with Superteam Europe to Conclude Solana Hackathon and Accelerate Web3 Innovation in Europe

      Ethereum Net Flows Turn Negative As Bulls Push For $3,500

      Bitcoin’s Power Compared To Nuclear Reactor By Brazilian Business Leader

      Senate advances GENIUS Act after cloture vote passes

    Ztoog
    Home » Is cybersecurity an unsolvable problem?
    Science

    Is cybersecurity an unsolvable problem?

    Facebook Twitter Pinterest WhatsApp
    Is cybersecurity an unsolvable problem?
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Farrar, Straus and Giroux

    In November 1988, a graduate pupil at Cornell University named Robert Morris, Jr. inadvertently sparked a nationwide disaster by unleashing a self-replicating pc worm on a VAX 11/750 pc within the Massachusetts Institute of Technology’s Artificial Intelligence Lab. Morris had no malicious intent; it was merely a scientific experiment to see what number of computer systems he might infect. But he made a grievous error, setting his reinfection charge a lot too excessive. The worm unfold so quickly that it introduced down all the pc community at Cornell University, crippled these at a number of different universities, and even infiltrated the computer systems at Los Alamos and Livermore National Laboratories.

    Making issues worse, his father was a pc scientist and cryptographer who was the chief scientist on the National Security Agency’s National Computer Security Center. Even although it was unintentional and witnesses testified that Morris did not have “a fraudulent or dishonest bone in his physique,” he was convicted of felonious pc fraud. The choose was merciful throughout sentencing. Rather than 15–20 years in jail, Morris acquired three years of probation with neighborhood service and needed to pay a $10,000 wonderful. He went on to discovered Y Combinator together with his longtime pal Paul Graham, amongst different accomplishments.

    The “Morris Worm” is only one of 5 hacking instances that Scott Shapiro highlights in his new ebook, Fancy Bear Goes Phishing: The Dark History of the Information Age in Five Extraordinary Hacks. Shapiro is a authorized thinker at Yale University, however as a baby, his mathematician father—who labored at Bell Labs—sparked an curiosity in computing by bringing residence varied elements, like microchips, resistors, diodes, LEDs, and breadboards. Their father/son outings included annual attendance on the Institute of Electrical and Electronics Engineers conference in New York City. Then, a classmate in Shapiro’s highschool biology class launched him to programming on the college’s TRS-80, and Shapiro was hooked. He moved on to engaged on an Apple II and majored in pc science in school however misplaced curiosity afterward and went to legislation faculty as a substitute.

    With his Yale colleague Oona Hathaway, Shapiro co-authored a ebook referred to as The Internationalists: How a Radical Plan to Outlaw War Remade the World, a sweeping historic evaluation of the legal guidelines of battle that spans from Hugo Grotius, the early seventeenth century father of worldwide legislation, all the way in which to 2014. That expertise raised quite a few questions on the way forward for warfare—specifically, cyberwar and whether or not the identical “guidelines” would apply. The matter appeared like a pure selection for his subsequent ebook, significantly given Shapiro’s background in pc science and coding.

    Advertisement

    Despite that background, “I actually had no concept what to say about it,” Shapiro informed Ars. “I simply discovered all of it extraordinarily complicated.” He was then requested to co-teach a particular course, “The Law and Technology of Cyber Conflict,” with Hathaway and Yale’s pc science division. But the equal mixture of legislation college students and pc science college students making an attempt to find out about two very completely different extremely technical fields proved to be a difficult mixture. “It was the worst class I’ve ever taught in my profession,” stated Shapiro. “At any given time, half the category was bored and the opposite half was confused. I realized nothing from it, and nor did any of the scholars.”

    That expertise goaded Shapiro to spend the subsequent few years making an attempt to crack that individual nut. He brushed up on C, x86 meeting code, and Linux and immersed himself within the historical past of hacking, reaching his first hack on the age of 52. But he additionally approached the difficulty from his discipline of experience. “I’m a thinker, so I wish to go to first rules,” he stated. “But pc science is simply a century outdated, and hacking, or cybersecurity, is perhaps a couple of many years outdated. It’s a really younger discipline, and a part of the issue is that folks have not thought it by from first rules.” The end result was Fancy Bear Goes Phishing.

    The ebook is a full of life, partaking learn crammed with fascinating tales and colourful characters: the notorious Bulgarian hacker often known as Dark Avenger, whose id remains to be unknown; Cameron LaCroix, a 16-year-old from south Boston infamous for hacking into Paris Hilton’s Sidekick II in 2005; Paras Jha, a Rutgers pupil who designed the “Mirai botnet”—apparently to get out of a calculus examination—and practically destroyed the Internet in 2016 when he hacked Minecraft; and naturally, the titular Fancy Bear hack by Russian army intelligence that was so central to the 2016 presidential election. (Fun truth: Shapiro notes that John von Neumann “constructed a self-reproducing automaton in 1949, many years earlier than every other hacker… [and] he wrote it with out a pc.”)

    But Shapiro additionally brings some penetrating perception into why the Internet stays so insecure many years after its invention, in addition to how and why hackers do what they do. And his conclusion about what may be accomplished about it’d show a bit controversial: there is no everlasting answer to the cybersecurity drawback. “Cybersecurity is just not a primarily technological drawback that requires a primarily engineering answer,” Shapiro writes. “It is a human drawback that requires an understanding of human conduct.” That’s his mantra all through the ebook: “Hacking is about people.” And it portends, for Shapiro, “the dying of ‘solutionism.'”

    Ars spoke with Shapiro to study extra.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Science

    Analysts Say Trump Trade Wars Would Harm the Entire US Energy Sector, From Oil to Solar

    Science

    Do we have free will? Quantum experiments may soon reveal the answer

    Science

    Was Planet Nine exiled from the solar system as a baby?

    Science

    How farmers can help rescue water-loving birds

    Science

    A trip to the farm where loofahs grow on vines

    Science

    AI Is Eating Data Center Power Demand—and It’s Only Getting Worse

    Science

    Liquid physics: Inside the lab making black hole analogues on Earth

    Science

    Risk of a star destroying the solar system is higher than expected

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Science

    Antifungals are going the way of antibiotics—overused, hitting resistance

    Clinicians in the US could also be overprescribing topical antifungal remedies for pores and skin…

    Mobile

    Smartphones with health labels could become a thing in Spain

    Many of us have seen how smartphones remodeled our lives, however for teenagers and youngsters,…

    Science

    Europa’s underground ocean seems to have the carbon necessary for life

    Artist’s impression of Europa (foreground) with Jupiter to the proper and the moon Io in…

    Science

    Odd black holes smaller than protons may have once littered the cosmos

    Colour-charged black holes may have shaped in the early universebetibup33/Shutterstock The universe may have once…

    Mobile

    Canalys: Smartphone market in India rebounds in Q4, posts 20% YoY increase

    Canalys revealed the smartphone market in India had a year-on-year development for the primary time…

    Our Picks
    Crypto

    Kirby McInerney LLP Announces a Proposed Settlement in the DraftKings NFT Settlement

    AI

    Researchers from Tsinghua University and Microsoft AI Unveil a Breakthrough in Language Model Training: The Path to Optimal Learning Efficiency

    Crypto

    Crypto Analyst Predicts Bitcoin 400% Surge To $200,000, Here’s When

    Categories
    • AI (1,493)
    • Crypto (1,753)
    • Gadgets (1,805)
    • Mobile (1,851)
    • Science (1,866)
    • Technology (1,802)
    • The Future (1,648)
    Most Popular
    Gadgets

    JBL Authentics 200 Review: A Great Little Smart Speaker

    Gadgets

    Tesla Cybertruck Delivery Event Live: Price, Range, Specs

    Crypto

    Dispersion Capital launches $40M fund focused on decentralized infrastructure

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.