Goto

Collaborating Authors

 black hat


ChatGPT, Bing, And The Upcoming Security Apocalypse

#artificialintelligence

Most security professionals will tell you that it's a lot easier to attack code systems than it is to defend them, and that this is especially true for large systems. The white hat's job is to secure each and every point of contact, while the black hat's goal is to find just one that's insecure. Whether black hat or white hat, it also helps a lot to know how the system works and exactly what it's doing. When you've got the source code, either because it's open-source, or because you're working inside the company that makes the software, you've got a huge advantage both in finding bugs and in fixing them. In the case of closed-source software, the white hats arguably have the offsetting advantage that they at least can see the source code, and peek inside the black box, while the attackers cannot.


Artificial Intelligence in Cybersecurity

#artificialintelligence

Artificial intelligence (AI) is rapidly permeating the enterprise security ecosystem, bringing a wide range of advanced capabilities to what is quickly becoming a key aspect of a successful digital business model. But while it might be tempting to just throw AI at the digital wall to see where it sticks, wiser business leaders are taking the time to ascertain where it can be used most effectively and how it must blend with normal operations so as not to hamper overall performance. According to Statista, the most popular security applications for AI involve protecting the network, endpoints and the data itself. Upwards of 75 percent of IT executives surveyed in 2019 report networking as the top area of concern, followed by 71 percent for data security and 68 percent for endpoints. Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.


Artificial Intelligence: Your Data Guardian - Data Guard 365

#artificialintelligence

Businesses of every variety and every industry are facing a constant attack by black hats trying to storm their digital fences and jeopardize their network integrity. Rarely a day goes by that the headlines are not filled with at least one story of another global conglomerate suffering under the weight of an all-out attack on their data and networks. Suffice it to say, if the largest and most technologically advanced organizations in the world still fall victim to these threats, every business with any sort of digital footprint is susceptible. That is not to say that your business, no matter its size or industry, is a proverbial sitting duck to the clever and relentless black hats of the world. In fact, with some deliberate planning and a well-organized game plan, companies can efficiently and effectively defend themselves and their data from intrusion.


Top hacks from Black Hat and DEF CON 2020

#artificialintelligence

We take a closer looking at some of the more unusual security research that was presented at this year's virtual Hacker Summer Camp The annual Hacker Summer Camp traversed from Las Vegas into the wilds of cyberspace this year, thanks to the coronavirus pandemic, but security researchers still rose to the challenge of maintaining the traditions of the event in 2020. As well as tackling core enterprise and web security threats, presenters at both Black Hat and DEF CON 2020 took hacking to weird and wonderful places. Anything with a computer inside was a target – a definition that these days includes cars, ATMs, medical devices, traffic lights, voting systems and much, much more. Security researcher Alan Michaels brought a new meaning to the phrase "insider threat" with a talk about the potential risk posed by implanted medical devices in secure spaces at Black Hat 2020. An aging national security workforce combined with the burgeoning, emerging market for medical devices means that the risk is far from theoretical.


A Conversation with Steve Durbin – Gigaom

#artificialintelligence

Right this moment's main minds discuss AI with host Byron Reese Hearken to this episode or learn the total transcript at www.VoicesinAI.com Byron Reese: That is Voices in AI dropped at you by GigaOm, and I'm Byron Reese. Right this moment our visitor is Steve Durbin. His principal areas of focus embody technique, info know-how, cybersecurity and the rising safety risk panorama throughout the company and private surroundings. He runs his firm because the managing director, which he has been doing for nearly a decade. Welcome to the present, Steve.


Cyber researcher pulls public talk on hacking Apple's...

Daily Mail - Science & tech

A cyber security researcher canceled a hacking conference briefing on how he said he could crack biometric facial recognition on Apple Inc iPhones, at the request of his employer, which called the work'misleading.' The prospect that Face ID could be defeated is troubling because it is used to lock down functions on tens of millions of iPhones from banking and healthcare apps to emails, text messages and photos. There is a one in 1 million chance a random person could unlock a Face ID, versus one in 50,000 chance that would happen with the iPhone's fingerprint sensor, according to Apple. Phil Schiller, Apple's senior vice president of worldwide marketing, announces features of the new iPhone X, including Face ID, at the Steve Jobs Theater on the new Apple campus. Now a cyber security researcher canceled a hacking conference briefing on how he said he could crack biometric facial recognition on Apple Inc iPhones, at the request of his employer, which called the work'misleading.'


Stopping cyberattacks. No human necessary

#artificialintelligence

This is part of our Road Trip 2017 summer series "The Smartest Stuff," about how innovators are thinking up new ways to make you -- and the world around you -- smarter. A Las Vegas driver asks me this after I tell him I'm headed to Defcon at Caesars Palace. All week, a cloud of paranoia looms over Las Vegas, as hackers from around the world swarm Sin City for Black Hat and Defcon, two back-to-back cybersecurity conferences taking place in the last week of July. At Caesars Palace, where Defcon is celebrating its 25th anniversary, the UPS store posts a sign telling guests it won't accept printing requests from USB thumb drives. You can't be too careful with all those hackers in town.


IBM Demonstrates DeepLocker AI Malware at Black Hat

#artificialintelligence

LAS VEGAS--IBM will detail at Black Hat USA here on Aug. 8 a new class of attacks dubbed DeepLocker that uses artificial intelligence to bypass cyber-security protections. With DeepLocker, IBM researchers will demonstrate an evasive attack vector that has been developed as a proof of concept. According to IBM, DeepLocker can be used to keep ransomware or other malware hidden from traditional security tools. IBM's goal with the presentation is not to promote fear about AI, but rather to help organizations start to think about how attackers can use AI and how to minimize risks. "DeepLocker malware is fundamentally different from any other malware we are aware of. It uses AI to hide a malicious application in benign payloads," Marc Ph.


What negative SEO is and is not - Search Engine Land

#artificialintelligence

Today we are starting a six-part series on Negative SEO. The series will be broken into three areas and will show how negative search engine optimization (SEO) has an effect on links, content and user signals. Positive SEO under this broader view would be any tactic performed with the intent to positively impact rankings for a uniform resource locator (URL), and possibly its host domain, by manipulating a variable within the links, content or user signals areas. Negative SEO would be any tactic performed with the intent to negatively impact rankings for a URL, and possibly its host domain, by manipulating a variable within the links, content or user signal buckets. If you can accidentally hurt your rankings by shifting a variable, then it would logically suggest that an external entity shifting that same variable associated with your site could result in a ranking decrease or outright deindexation.


Cyber security AI is almost here – but where does that leave us humans?

#artificialintelligence

Whatever the industry or application, it seems that any attempt at future-gazing around technology today will inevitably turn to the impact of artificial intelligence (AI). From automated customer support and targeted marketing to self-driving vehicles and even the field of war, AI has huge potential in almost every aspect of our professional and personal lives. In the security industry, AI is being looked to in order to create the ultimate solution for advanced cyber-attacks. This vision of security nirvana involves the arrival of a system so sophisticated that it can detect and shut down an attack before us mere humans are even aware there was a threat at all. In many applications, the impending advent of AI has proven to be a controversial idea, with debate frequently turning to nightmarish outcomes like the malevolent and murderous Skynet or HAL 9000.