Close Menu
Ztoog
    What's Hot
    Technology

    Car quality is suffering as automakers shift focus to technology

    Science

    Jackdaws will maneuver socially for better snacks

    AI

    This AI Paper from Qualcomm AI Research Unveils EDGI: A Groundbreaking Equivariant Diffuser for Advanced Model-Based Reinforcement Learning and Efficient Planning

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      OPPO launches A5 Pro 5G: Premium features at a budget price

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

    • Technology

      What It Is and Why It Matters—Part 1 – O’Reilly

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Motorola’s Moto Watch needs to start living up to the brand name

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

    • Science

      Nothing is stronger than quantum connections – and now we know why

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

    • AI

      Hybrid AI model crafts smooth, high-quality videos in seconds | Ztoog

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

    • Crypto

      Ethereum Breaks Key Resistance In One Massive Move – Higher High Confirms Momentum

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

    Ztoog
    Home » Is cybersecurity an unsolvable problem?
    Science

    Is cybersecurity an unsolvable problem?

    Facebook Twitter Pinterest WhatsApp
    Is cybersecurity an unsolvable problem?
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Farrar, Straus and Giroux

    In November 1988, a graduate pupil at Cornell University named Robert Morris, Jr. inadvertently sparked a nationwide disaster by unleashing a self-replicating pc worm on a VAX 11/750 pc within the Massachusetts Institute of Technology’s Artificial Intelligence Lab. Morris had no malicious intent; it was merely a scientific experiment to see what number of computer systems he might infect. But he made a grievous error, setting his reinfection charge a lot too excessive. The worm unfold so quickly that it introduced down all the pc community at Cornell University, crippled these at a number of different universities, and even infiltrated the computer systems at Los Alamos and Livermore National Laboratories.

    Making issues worse, his father was a pc scientist and cryptographer who was the chief scientist on the National Security Agency’s National Computer Security Center. Even although it was unintentional and witnesses testified that Morris did not have “a fraudulent or dishonest bone in his physique,” he was convicted of felonious pc fraud. The choose was merciful throughout sentencing. Rather than 15–20 years in jail, Morris acquired three years of probation with neighborhood service and needed to pay a $10,000 wonderful. He went on to discovered Y Combinator together with his longtime pal Paul Graham, amongst different accomplishments.

    The “Morris Worm” is only one of 5 hacking instances that Scott Shapiro highlights in his new ebook, Fancy Bear Goes Phishing: The Dark History of the Information Age in Five Extraordinary Hacks. Shapiro is a authorized thinker at Yale University, however as a baby, his mathematician father—who labored at Bell Labs—sparked an curiosity in computing by bringing residence varied elements, like microchips, resistors, diodes, LEDs, and breadboards. Their father/son outings included annual attendance on the Institute of Electrical and Electronics Engineers conference in New York City. Then, a classmate in Shapiro’s highschool biology class launched him to programming on the college’s TRS-80, and Shapiro was hooked. He moved on to engaged on an Apple II and majored in pc science in school however misplaced curiosity afterward and went to legislation faculty as a substitute.

    With his Yale colleague Oona Hathaway, Shapiro co-authored a ebook referred to as The Internationalists: How a Radical Plan to Outlaw War Remade the World, a sweeping historic evaluation of the legal guidelines of battle that spans from Hugo Grotius, the early seventeenth century father of worldwide legislation, all the way in which to 2014. That expertise raised quite a few questions on the way forward for warfare—specifically, cyberwar and whether or not the identical “guidelines” would apply. The matter appeared like a pure selection for his subsequent ebook, significantly given Shapiro’s background in pc science and coding.

    Advertisement

    Despite that background, “I actually had no concept what to say about it,” Shapiro informed Ars. “I simply discovered all of it extraordinarily complicated.” He was then requested to co-teach a particular course, “The Law and Technology of Cyber Conflict,” with Hathaway and Yale’s pc science division. But the equal mixture of legislation college students and pc science college students making an attempt to find out about two very completely different extremely technical fields proved to be a difficult mixture. “It was the worst class I’ve ever taught in my profession,” stated Shapiro. “At any given time, half the category was bored and the opposite half was confused. I realized nothing from it, and nor did any of the scholars.”

    That expertise goaded Shapiro to spend the subsequent few years making an attempt to crack that individual nut. He brushed up on C, x86 meeting code, and Linux and immersed himself within the historical past of hacking, reaching his first hack on the age of 52. But he additionally approached the difficulty from his discipline of experience. “I’m a thinker, so I wish to go to first rules,” he stated. “But pc science is simply a century outdated, and hacking, or cybersecurity, is perhaps a couple of many years outdated. It’s a really younger discipline, and a part of the issue is that folks have not thought it by from first rules.” The end result was Fancy Bear Goes Phishing.

    The ebook is a full of life, partaking learn crammed with fascinating tales and colourful characters: the notorious Bulgarian hacker often known as Dark Avenger, whose id remains to be unknown; Cameron LaCroix, a 16-year-old from south Boston infamous for hacking into Paris Hilton’s Sidekick II in 2005; Paras Jha, a Rutgers pupil who designed the “Mirai botnet”—apparently to get out of a calculus examination—and practically destroyed the Internet in 2016 when he hacked Minecraft; and naturally, the titular Fancy Bear hack by Russian army intelligence that was so central to the 2016 presidential election. (Fun truth: Shapiro notes that John von Neumann “constructed a self-reproducing automaton in 1949, many years earlier than every other hacker… [and] he wrote it with out a pc.”)

    But Shapiro additionally brings some penetrating perception into why the Internet stays so insecure many years after its invention, in addition to how and why hackers do what they do. And his conclusion about what may be accomplished about it’d show a bit controversial: there is no everlasting answer to the cybersecurity drawback. “Cybersecurity is just not a primarily technological drawback that requires a primarily engineering answer,” Shapiro writes. “It is a human drawback that requires an understanding of human conduct.” That’s his mantra all through the ebook: “Hacking is about people.” And it portends, for Shapiro, “the dying of ‘solutionism.'”

    Ars spoke with Shapiro to study extra.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Science

    Nothing is stronger than quantum connections – and now we know why

    Science

    Failed Soviet probe will soon crash to Earth – and we don’t know where

    Science

    Trump administration cuts off all future federal funding to Harvard

    Science

    Does kissing spread gluten? New research offers a clue.

    Science

    Why Balcony Solar Panels Haven’t Taken Off in the US

    Science

    ‘Dark photon’ theory of light aims to tear up a century of physics

    Science

    Signs of alien life on exoplanet K2-18b may just be statistical noise

    Science

    New study: There are lots of icy super-Earths

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Crypto

    Base Ecosystem Fund, Hashed Emergent invest $1.9M in Nestcoin to scale its Onboard product

    Nestcoin, a growth firm housing fashionable finance challenge Onboard, has secured $1.9 million in a…

    The Future

    Ausdroid Reviews: OPPO Find N3 – unfold your world

    Foldable and flip telephones are all the fad proper now and while I really feel…

    Mobile

    Honor Magic7 Pro teaser video shows off new quad camera

    This Wednesday, Honor will unveil the following main model of its Android software program, MagicOS…

    Science

    Mars was icy and wet billions of years ago, new study suggests

    Today, Mars is chilly and dry. Billions of years in the past, nonetheless, there was…

    Gadgets

    Rest in peace, neglected iTunes Movie Trailer app and website

    Enlarge / The now-ancient iTunes Movie Trailers app and website have rolled into Apple’s TV…

    Our Picks
    Gadgets

    The best small printers for 2024

    Crypto

    Bitcoin Price At Risk? Whale Transfers $137 Million In BTC After 3-Year Dormancy

    Technology

    Samsung finally gives One UI 6 to its older foldable Galaxy phones

    Categories
    • AI (1,483)
    • Crypto (1,745)
    • Gadgets (1,796)
    • Mobile (1,840)
    • Science (1,854)
    • Technology (1,790)
    • The Future (1,636)
    Most Popular
    Technology

    Nvidia Blackwell RTX 5000 GPUs may debut earlier than expected

    Science

    Record-breaking neutrino spotted tearing through the Mediterranean Sea

    AI

    Are we ready to trust AI with our bodies?

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.