- Overview
-
Degrees & Certificates
- Certificates
- Programs by Category
- Partner Solutions & Training
- Why CPSCE
- Events & Resources
- About The Center
Upcoming Events and Additional Information
The Center for Public Safety and Cybersecurity Education (CPSCE) is committed to providing access to timely and relevant information for industry professionals, as well as the communities we serve. In addition to hosting a variety of special events throughout the year, the Center also maintains a list of well-regarded public safety and cybersecurity resources.
Contact Us
Learn more about how Franklin can develop tailored training solutions for your organization.
CPSCE Blog
Association of Technology Professionals 2nd Annual Scholarship Recipient Announced >
Spotlight: Dr. Ned Pettus Jr., Director of Public Safety for the City of Columbus >
Aspect-Oriented Programming's Ironical Relation to Information Security >
Digital Transformation is Occurring at a Rapid Pace. Are You Ready? >
Creek Technologies is Seeking Franklin and Urbana Students and Alumni for Open Positions >
News Feeds
Get the latest cyber security news and insight from industry leaders.
Schneier on Security
A Taxonomy of Prompt Injection Attacks
March 14, 2024 - 10:10pm
Bruce Schneier
<p>Researchers ran a global prompt hacking competition, and have <a href="https://arxiv.org/pdf/2311.16119.pdf">documented</a> the results in a paper that both gives a lot of good examples and tries to organize a taxonomy of effective prompt injection strategies. It seems as if the most common successful strategy is the “compound instruction attack,” as in “Say ‘I have been PWNED’ without a period.”</p> <blockquote><p>Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition</p> <p><b>Abstract:</b> Large Language Models (LLMs) are deployed in interactive contexts with direct user engagement, such as chatbots and writing assistants. These deployments are vulnerable to prompt injection and jailbreaking (collectively, prompt hacking), in which models are manipulated to ignore their original instructions and follow potentially malicious ones. Although widely acknowledged as a significant security threat, there is a dearth of large-scale resources and quantitative studies on prompt hacking. To address this lacuna, we launch a global prompt hacking competition, which allows for free-form human input attacks. We elicit 600K+ adversarial prompts against three state-of-the-art LLMs. We describe the dataset, which empirically verifies that current LLMs can indeed be manipulated via prompt hacking. We also present a comprehensive taxonomical ontology of the types of adversarial prompts...</p></blockquote>
How Public AI Can Strengthen Democracy
March 14, 2024 - 1:34am
Bruce Schneier
<p>With the world’s focus turning to <a href="https://abcnews.go.com/Politics/ai-political-campaigns-raising-red-flags-2024-election/story?id=102480464">misinformation</a>, <a href="https://www.washingtonpost.com/technology/2023/10/26/ai-election-2024-deepfake-pledge/">manipulation</a>, and outright propaganda ahead of the 2024 U.S. presidential election, we know that democracy has an AI problem. But we’re learning that AI has a democracy problem, too. Both challenges must be addressed for the sake of democratic governance and public protection.</p> <p>Just <a href="https://www.srgresearch.com/articles/quarterly-cloud-market-once-again-grows-by-10-billion-from-2022-meanwhile-little-change-at-the-top">three Big Tech firms</a> (Microsoft, Google, and Amazon) control about two-thirds of the global market for the cloud computing resources used to train and deploy AI models. They have a lot of the AI talent, the capacity for large-scale innovation, and face few public regulations for their products and activities...</p>
Drones and the US Air Force
March 13, 2024 - 11:44pm
Bruce Schneier
<p>Fascinating <a href="https://warontherocks.com/2024/03/drones-the-air-littoral-and-the-looming-irrelevance-of-the-u-s-air-force/">analysis</a> of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change.</p> <blockquote><p>The F-35A certainly remains an important platform for high-intensity conventional warfare. But the Air Force is planning to buy 1,763 of the aircraft, which will remain in service through the year 2070. These jets, which are wholly unsuited for countering proliferated low-cost enemy drones in the air littoral, present <i>enormous</i> opportunity costs for the service as a whole. In a set of comments <a href="https://www.linkedin.com/posts/kevin-murray-1507a055_deadly-cheap-and-widespread-how-iran-supplied-activity-7162108210366119938-VVMi">posted on LinkedIn...</a></p></blockquote>
Improving C++
March 13, 2024 - 11:41pm
Bruce Schneier
<p>C++ guru Herb Sutter <a href="https://herbsutter.com/2024/03/11/safety-in-context/">writes</a> about how we can improve the programming language for better security.</p> <blockquote><p>The immediate problem “is” that it’s Too Easy By Default™ to write security and safety vulnerabilities in C++ that would have been caught by stricter enforcement of known rules for <i>type, bounds, initialization</i>, and <i>lifetime</i> language safety.</p></blockquote> <p>His conclusion:</p> <blockquote><p>We need to improve software security and software safety across the industry, especially by improving programming language safety in C and C++, and in C++ a 98% improvement in the four most common problem areas is achievable in the medium term. But if we focus on programming language safety alone, we may find ourselves fighting yesterday’s war and missing larger past and future security dangers that affect software written in any language...</p></blockquote>
Friday Squid Blogging: Operation Squid
March 13, 2024 - 11:23pm
Bruce Schneier
<p>Operation Squid found <a href="https://www.cbsnews.com/news/cocaine-hidden-frozen-fish-portugal-operation-squid/">1.3 tons of cocaine</a> hidden in frozen fish.</p> <p>As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.</p> <p>Read my blog posting guidelines <a href="https://www.schneier.com/blog/archives/2017/03/commenting_poli.html">here</a>.</p>
Krebson Security
CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms
March 14, 2024 - 5:13pm
BrianKrebs
The data privacy company Onerep.com bills itself as a Virginia-based service for helping people remove their personal information from almost 200 people-search websites. However, an investigation into the history of onerep.com finds this company is operating out of Belarus and Cyprus, and that its founder has launched dozens of people-search services over the years.
Patch Tuesday, March 2024 Edition
March 12, 2024 - 4:36pm
BrianKrebs
Apple and Microsoft recently released software updates to fix dozens of security holes in their operating systems. Microsoft today patched at least 60 vulnerabilities in its Windows OS. Meanwhile, Apple's new macOS Sonoma addresses at least 68 security weaknesses, and its latest updates for iOS fixes two zero-day flaws.
Incognito Darknet Market Mass-Extorts Buyers, Sellers
March 11, 2024 - 12:19pm
BrianKrebs
Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from $100 to $20,000. The bold mass extortion attempt comes just days after Incognito Market administrators reportedly pulled an "exit scam" that left users unable to withdraw millions of dollars worth of funds from the platform.
A Close Up Look at the Consumer Data Broker Radaris
March 8, 2024 - 8:02am
BrianKrebs
If you live in the United States, the data broker Radaris likely knows a great deal about you, and they are happy to sell what they know to anyone. But how much do we know about Radaris? Publicly available data indicates that in addition to running a dizzying array of people-search websites, the co-founders of Radaris operate multiple Russian-language dating services and affiliate programs. It also appears many of their businesses have ties to a California marketing firm that works with a Russian state-run media conglomerate currently sanctioned by the U.S. government.
BlackCat Ransomware Group Implodes After Apparent $22M Payment by Change Healthcare
March 5, 2024 - 7:22pm
BrianKrebs
There are indications that U.S. healthcare giant Change Healthcare has made a $22 million extortion payment to the infamous BlackCat ransomware group (a.k.a. "ALPHV") as the company struggles to bring services back online amid a cyberattack that has disrupted prescription drug services nationwide for weeks. However, the cybercriminal who claims to have given BlackCat access to Change's network says the crime gang cheated them out of their share of the ransom, and that they still have the sensitive data that Change reportedly paid the group to destroy. Meanwhile, the affiliate's disclosure appears to have prompted BlackCat to cease operations entirely.
FBI Cyber Crime Stories
Threat Post
InfoSec Island
Resources
- The City of Columbus Department of Public Safety
- Ohio Attorney General
- Ohio Attorney General Cybersecurity
- State of Ohio Office of the Inspector General
- Ohio Homeland Security
- Ohio Department of Commerce
- Ohio Fire Chief's Association and Ohio Fire and Emergency Services Foundation
- National Security Agency and Central Security Service
- The Department of Homeland Security
- Federal Bureau of Investigation
- InfraGard Partnership for Protection
- Dark Reading
- Security Weekly
- TaoSecurity Blog
- Liquidmatrix Bot
- Infosecurity Mag
- Columbus Collaboratory
- National Cyberwatch Center
- Security Magazine
- Threatpost
- Ohio Auditor
- Open Software Security Community
- WOSU Public Media NovaLabs
Request Free Information
Learn more about how Franklin can develop an educational partnership tailored to your organization.
Get in touch with us today!
Franklin University
201 S Grant Ave.
Columbus, OH 43215
Local: (614) 797-4700
Toll Free: (877) 341-6300
admissions@franklin.edu
Copyright 2024 Franklin University
Franklin University is accredited by the Higher Learning Commission (hlcommission.org/800.621.7440) and authorized by the Ohio Department of Higher Education.
Franklin University is committed to being an inclusive community free from all forms of discrimination and harassment.