FREMONT, CA – The rapid growth of automobile technology has enhanced connectivity in modern vehicles. The digital revolution in the automobile industry has made it possible for manufacturers to integrate AI-powered services to improve navigation and functionality of their products. The integration of artificial intelligence (AI) and the internet of things (IoT) has enabled vehicles to communicate with digital devices. However, the integration of complex networks in the connected cars has opened new pathways for hackers, escalating the risk of cyberattacks.
A cyber-security expert from Queen's University Belfast has been appointed to a body designed to develop the UK artificial intelligence (AI) sector. Prof Máire O'Neill has joined leaders from business, academia and data privacy on the UK Artificial Intelligence Council. Prof O'Neill is the inventor of a silicon security chip that is used in more than 100m TV set-top boxes. The council will promote the adoption of AI and its ethical use in business. Prof O'Neill said that she was delighted to have been invited to join the new body.
Extreme Networks has taken the wraps off a new security application it says will use machine learning and artificial intelligence to help customers effectively monitor, detect and automatically remediate security issues with networked IoT devices. The application – ExtremeAI security--features machine-learning technology that can understand typical behavior of IoT devices and automatically trigger alerts when endpoints act in unusual or unexpected ways, Extreme said. Extreme said that the ExtremeAI Security application can tie into all leading threat intelligence feeds, and had close integration with its existing Extreme Workflow Composer to enable automatic threat mitigation and remediation. The application integrates the company's ExtremeAnalytics application which lets customers view threats by severity, category, high-risk endpoints and geography. An automated ticketing feature integrates with variety of popular IT tools such as Slack, Jira, and ServiceNow, and the application interoperates with many popular security tools, including existing network taps, the vendor stated.
People care about their privacy, but not enough to quit buying gadgets that expose their personal data, says a new study on consumer habits. Consumers International and the Internet Society surveyed thousands of people across North America, Europe and Asia to better understand the relationship between consumers and'smart' devices -- a term they defined as'everyday device and products that can connect to the internet.' The study did not include phones and mobile apps, which present a vast and more complex array of privacy issues. What they found was that many respondents using products like Google Home or Amazon Echo, fitness wearables, gaming consoles and internet-connected home appliances shared concern over how those devices harvest and share their personal data. Consumers think that data collection of their smart devices is'creepy' according to a new study of consumers across the world.
A technician works in a lab at GeseDNA Technology in Beijing. To counter China, the U.S. plans to impose new export restrictions on "emerging and foundational technology" that researchers say could affect the way they share genetic materials with international labs. A technician works in a lab at GeseDNA Technology in Beijing. To counter China, the U.S. plans to impose new export restrictions on "emerging and foundational technology" that researchers say could affect the way they share genetic materials with international labs. For the last 15 years, Addgene has dedicated itself to accelerating medical research.
Visiongain has launched a new cyber report Artificial Intelligence in Cyber Security Market Report 2019-2029: Forecasts by Component (Hardware, Software, Services), by Deployment Type (On-premise, Cloud, Hybrid), by Security Type (Endpoint Security, Network Security, Application Security, Cloud Security), by Technology (Machine Learning, Natural Language Processing, Context Awareness Computing), by Application (Antivirus/Antimalware, Identity and Access Management (IAM), Risk and Compliance Management, Intrusion Detection/Prevention Systems, Encryption, Unified Threat Management (UTM), Data Loss Prevention (DLP), Others), by Industry (Enterprise, BFSI, Government & Defence, Retail, Healthcare, Manufacturing, Automotive & Transportation, Others), Leading Company Analysis, Regional and Leading National Market Analysis. The increasing number of cyber frauds and malicious attacks is one of the prime growth factors of artificial intelligence in the cyber security market. In addition, the growing adoption of bring your own devices (BYOD) in organisations is also anticipated to drive the growth of artificial intelligence in the cyber security market. With the rising incidences of cyber-crimes, artificial intelligence in the cybersecurity market will gain traction in years to come. Cyber-frauds such as identity and payment card thefts, account for over 55% of all cyber-crimes and may prove costly for organisations, if not resolved quickly.
Today, cyber threats have become one of the major concerns for several industry leaders, as they cause electrical blackouts, breaches of national security secrets as well as the military equipment. They can also result in the theft of valuable and sensitive data like medical records. They are capable of disrupting phone and computer networks or paralyze systems, making the data unavailable. However, such situations can be avoided with the modern technologies like Artificial Intelligence and Machine Learning. AI has been portraying limitless potential in various applications across different industries.
Google shares slumped on Monday after the company failed to beat analyst predictions, following a year of internal turmoil, privacy concerns, and several international fines. Stock for Alphabet, Google's parent company, was down 7% in after-hours trading after the company reported first quarter revenue of $36.34bn, lower than the $37.33bn revenue forecast by analysts. The quarter one earnings represent a 17% increase from the same time last year, in which it reported $31.15bn in revenue. In a call with investors on Monday, Google's CEO, Sundar Pichai, said the company would continue to invest more in algorithms on YouTube, following recent incidents that saw the platform offering misinformation, hate speech, and disturbing content targeting children. He also promised to continue to address user privacy concerns.
We expect an increase in frequency and severity of cyber-attacks that comes along with the need of efficient security countermeasures. The process of attributing a cyber-attack helps in constructing efficient and targeted mitigative and preventive security measures. In this work, we propose an argumentation-based reasoner (ABR) that helps the analyst during the analysis of forensic evidence and the attribution process. Given the evidence collected from the cyber-attack, our reasoner helps the analyst to identify who performed the attack and suggests the analyst where to focus further analyses by giving hints of the missing evidence, or further investigation paths to follow. ABR is the first automatic reasoner that analyzes and attributes cyber-attacks by using technical and social evidence, as well as incomplete and conflicting information. ABR was tested on realistic cyber-attacks cases.
Machine learning can synthesize "almost-but-not-quite replica data" based on real data, facilitating research and data sharing while protecting privacy of the real data, but inconsistent data protection laws can stymie use of this approach. Removal of key information from data can enhance privacy, but this limits data utility and fuels an arms race between deidentification and reidentification. Instead, a generative adversarial network can synthesize data that mimic a protected dataset for analytical purposes but are less likely to reveal any actual private information. Bellovin et al. recommend amendments to privacy statutes that are often too absolute and fail to recognize the protections and analytical potential of this approach.