If you are looking for an answer to the question What is Artificial Intelligence? and you only have a minute, then here's the definition the Association for the Advancement of Artificial Intelligence offers on its home page: "the scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines."
However, if you are fortunate enough to have more than a minute, then please get ready to embark upon an exciting journey exploring AI (but beware, it could last a lifetime) …
In October 2016, an attack on Dyn DNS shut down the internet. It soon became clear that the attack was possible because of an overwhelming number of new, unsecured, internet-connected devices--the Internet of Things (IoT). This year's Consumer Electronic's Show has introduced us to plenty of new IoT devices, including cute robots, new capabilities for Amazon's Alexa (despite the fact that she keeps buying things for people that they didn't order), and even a smart hairbrush and pillow, which both sound very necessary. Symantec, the company behind Norton AntiVirus, has come up with a unique answer to the growing IoT problem. Rather than protecting each of your devices individually, Symantec's new wifi router (the Norton Core) will use the company's expertise and software to protect up to 20 laptops, computers, tablets, or smartphones--and an unlimited number of IoT devices--in one fell swoop.
Last month, people in India woke up to the news about the largest data breach in the country. It involved data stolen from 3.2 million debit cards between 25 May and 10 July from a network of bank ATMs, managed by a Japanese payment services company. However, the breach was reported in the media only on 21 October. This fraud is simply a case in point. It was only this January, for instance, that the data of over 7 million users of the mobile edition of the popular game Minecraft was breached.
There's a new weapon in the never-ending battle against cyber crime: Machine learning. It's generating a great deal of interest, getting substantial backing from venture capitalists and even being billed as a must-have addition to the cyber-security arsenal. The idea of machine learning has been around for many years but today's realisations differ radically from earlier technologies. In simple terms machine learning software has no programmed-in knowledge about the domain to which it is to be applied but gains that knowledge by being taught. For example if you want to develop a machine-learning based optical character recognition system you feed it with many images of letters of the alphabet and you tell it "this is an'A' this is a'B'" and so on.
Symantec Corp. has announced Symantec Endpoint Protection 14, powered by artificial intelligence on the endpoint and in the cloud. The company says the latest version fuses essential endpoint technologies with advanced machine learning and memory exploit mitigation in a single agent, delivering a multi-layered solution able to stop advanced threats and respond at the endpoint regardless of how the attack is launched. Symantec Endpoint Protection delivers protection in a lightweight package, building on 99.9 percent efficacy, low false positives and a 70 percent reduced footprint over the previous generation through new advanced cloud lookup capabilities, according to the company. Powered by combined threat intelligence capabilities made possible by integrating Symantec and Blue Coat's security telemetry, Symantec now protects 175 million consumer and enterprise endpoints, 163 million email users, 80 million web proxy users, and processes nearly eight billion security requests across these products every day. "Symantec Endpoint Protection 14 is a major leap forward in endpoint protection, delivering the latest innovations in endpoint security on a single platform and from a security company you can trust," said Alan Lee, Senior Manager, Global Product Management, Advanced Threat Protection Group, Symantec.
At the Trend Micro Insight 2016 event for industry analysts, the 27-year-old pure play security vendor displayed a modern enterprise security portfolio updated with new machine learning capabilities and fresh threat intelligence. The combination of Trend Micro's refreshed portfolio, ample resources and fortunate timing due to disruptions challenging some of its key competitors position Trend Micro to accelerate its revenue growth in 2017. According to TBR's estimates, the vendor's year-to-year enterprise (nonconsumer) security revenue growth has often lagged the market average, ranging from -6 percent to 5 percent (not including the inorganic increase it earned from its 1Q16 acquisition of TippingPoint) over the past two years. TBR expects Trend Micro to achieve high-single-digit growth in 2017 based on its current initiatives. These initiatives include promoting its new machine learning-based threat detection capabilities on servers and endpoints, expanding its cloud service provider partnerships to extend its Deep Security solution to more platforms, and leveraging TippingPoint to increase its customer base in the Americas.
Symantec has launched Endpoint Protection 14, a new security solution which harnesses artificial intelligence to protect clients. Announced on November 1, the new security offering is powered by AI and machine learning on the endpoint and in the cloud. Symantec says that by harnessing machine learning to collate data and detect patterns and anomalies which may indicate a cyberattack, AI provides "a multi-layered solution able to stop advanced threats and respond at the endpoint regardless of how the attack is launched." Symantec Endpoint Protection combines machine learning, memory exploit mitigation, and threat intelligence provided by Symantec and Blue Coat, which combined their research and security operations in October after Symantec completed the acquisition of Blue Coat for $4.6 billion. The company also says that the solution is capable of 99.9 percent efficacy, low false positives, and a 70 percent carbon footprint reduction in comparison to past endpoint software.
The popular dating app generally doesn't verify most user accounts, but that hasn't stopped spammers from pretending to offer the service. In recent weeks, automated bots masquerading as Tinder profiles have been telling real users to get "verified," as part of a clever scam to sell them porn, security firm Symantec said on Thursday. The spam bots first send off flirty messages, like "Wanna eat cookie dough together some time?" It's a free service, the spam bot will claim, and done "to verify the person you wanna meet isn't a serial killer lol." The spam bot will then send a link to a site called "Tinder Safe Dating."
He told iTWire that Symantec's unified security strategy has four legs: Machine learning is "finding its way into everything we do," he said. Symantec started applying machine learning more than a decade ago, and now has a team of between 30 and 40 people working to apply it to autonomous anomaly detection. More that 80% of detections are the result of machine learning, thanks to the scale of Symantec's operations. The machine learning system runs on "one of the largest Hadoop clusters anywhere," he said.