Collaborating Authors

Kitamura Holdings group company releases SARAH.AI, a photobook app developed by

#artificialintelligence, from Cheetah, automatically analyzes photos taken on mobile phones to create stories. It does this by curating the photoset using state-of-the-art machine-learning computer vision algorithms to remove duplicates, to find the best photos, and to discard the bad ones. Users can edit their photobooks by adding/removing photos and write titles and captions on every page. They can also change the sequence and the colors of pages, delete and add pages (to a maximum of 96 pages). Find out more here:

Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning Artificial Intelligence

Evolving cybersecurity threats are a persistent challenge for systemadministrators and security experts as new malwares are continu-ally released. Attackers may look for vulnerabilities in commercialproducts or execute sophisticated reconnaissance campaigns tounderstand a targets network and gather information on securityproducts like firewalls and intrusion detection / prevention systems(network or host-based). Many new attacks tend to be modificationsof existing ones. In such a scenario, rule-based systems fail to detectthe attack, even though there are minor differences in conditions /attributes between rules to identify the new and existing attack. Todetect these differences the IDS must be able to isolate the subset ofconditions that are true and predict the likely conditions (differentfrom the original) that must be observed. In this paper, we proposeaprobabilistic abductive reasoningapproach that augments an exist-ing rule-based IDS (snort [29]) to detect these evolved attacks by (a)Predicting rule conditions that are likely to occur (based on existingrules) and (b) able to generate new snort rules when provided withseed rule (i.e. a starting rule) to reduce the burden on experts toconstantly update them. We demonstrate the effectiveness of theapproach by generating new rules from the snort 2012 rules set andtesting it on the MACCDC 2012 dataset [6].

Hands-On: Kali Linux 2018.1 on the Raspberry Pi Zero W


Here's what developers really think about AWS, Microsoft Azure, and Google Cloud Platform providers lack adequate support resources for developers. I wrote about Kali Linux 2017.3 not long ago, and I looked at the Raspberry Pi 2 and 3 version. Now there is a new Kali release available (2018.1), and it includes a version specifically for the Raspberry Pi Zero W! Yippie! This is great news for computer and network security professionals, because, as I have said many times before, I believe that Kali is the absolute best Linux distribution for security and penetration testing, and having that available on a computer that you can stick in your shirt pocket is just awesome! The installation image is actually on the Offensive Security Kali Linux ARM Images page, so don't get confused if you go to the normal Kali Linux Downloads page and don't see it.

Manchester attack: Victoria railway station reopens

BBC News

Manchester Victoria railway station has reopened more than a week after the suicide attack at the city's arena. The station, attached to Manchester Arena, was shut after the bombing at the Ariana Grande concert, which left 22 people dead and dozens injured. More CCTV footage of bomber Salman Abedi has been released and police are appealing for people who might have seen him carrying a blue suitcase. Forensic teams have also been seen searching a landfill site in Bury. British Transport Police said its officers would be on patrol at the station on Tuesday.

UK and Australian Information Commissioners to investigate Clearview AI


The UK Information Commissioner's Office and Office of the Australian Information Commissioner (OAIC) announced on Thursday that the pair would be teaming up to conduct a joint investigation into Clearview AI. In April, OAIC asked questions of the company and issued a notice to produce under section 44 of the Australian Privacy Act. Two months prior, the face recognition company suffered a data breach that included its customer list, the number of accounts each customer has, and the number of searches those customers had made. "Security is Clearview's top priority," Clearview AI attorney Tor Ekeland said at the time. "Unfortunately, data breaches are part of life in the 21st century. Our servers were never accessed. We patched the flaw and continue to work to strengthen our security."