Goto

Collaborating Authors

 security expert


Inside the Multimillion-Dollar Plan to Make Mobile Voting Happen

WIRED

Political consultant Bradley Tusk has spent a fortune on mobile voting efforts. Now, he's launching a protocol to try to mainstream the technology. Joe Kiniry, a security expert specializing in elections, was attending an annual conference on voting technology in Washington, DC, when a woman approached him with an unusual offer. She said she represented a wealthy client interested in funding voting systems that would encourage bigger turnouts. Did he have any ideas?


AI threat landscape could include automated propaganda bots, sophisticated email attacks: Security experts

FOX News

As more companies rush to implement AI solutions and software, a growing number of experts are warning that it could result in an explosion of'fake news' and misinformation. Artificial intelligence (AI) will become a "fundamental game changer" throughout the world, enabling scalable disinformation campaigns and online scams, but global cyber-cooperation and traditional security hygiene should provide significant protection for companies and individuals, according to experts. Center for a New American Security CEO Richard Fontaine told Fox News Digital that until now, humans have primarily created disinformation. While it may have been propagated through digital means, it was not made through digital means. But these new AI applications could now allow a government to propagate and originate disinformation at scale.


New algorithms protect against quantum computing threats - IoT Times

#artificialintelligence

According to a 2019 article in the Financial Times, a quantum computer built by Google could perform a calculation "in three minutes and 20 seconds that would take today's most advanced classical computer … approximately 10,000 years". It has been said that a fully capable quantum computer could break the most robust encryption in minutes, rendering current internet security useless. While prototypes of so-called quantum computers exist, developed by companies ranging from IBM to D-Wave, they can only perform the same tasks classical computers can, albeit quicker. Those technologies' speed of development is languid compared to the rest of the computing industry. The most significant challenge quantum computing faces today is the need to hold qubits in near absolute zero temperatures to keep them stable.


Dangerous malware is up 86%: Here's how AI can help

#artificialintelligence

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. We've all heard that data breaches and other cybersecurity threats are on the rise, but the latest numbers, from SiteLock's 2022 Security Report, are truly staggering: "High-severity malware" is up 86% year-over-year. High-severity threats are those that can lead to stolen data, loss of customer trust, and damage to reputation and brand. More specifically, this includes the likes of malware downloads, phishing, redirects to malicious websites and code injection. In other words, it's becoming increasingly easy for hackers to target innocent users and wreak havoc on their lives and businesses.


Can artificial intelligence spot spam quicker than humans?

#artificialintelligence

More than 40 years ago in 1978, a computer vendor in the USA sent the first spam email, but only 20 years later, in the early 2000s, it looked as if spam would finally kill off email altogether. The huge quantities of junk email being generated threatened to overwhelm the world's inboxes and stifle productivity completely. It was just a stroke of good luck that artificial intelligence (AI) in the shape of machine learning (ML) emerged at around the same time to help combat the onslaught by sifting through massive amounts of data and using it to learn how to recognise different patterns that were a common feature of mass mailings. AI is sometimes used as a catch all term, when in practice most companies are using machine learning which can't extrapolate new conclusions without new training data. Today, machine learning artificial/intelligence can spot spam, but because of the limits of machine learning, humans need to step in from time to time.


Leveraging machine learning to find security vulnerabilities

#artificialintelligence

GitHub code scanning now uses machine learning (ML) to alert developers to potential security vulnerabilities in their code. If you want to set up your repositories to surface more alerts using our new ML technology, get started here. Code security vulnerabilities can allow malicious actors to manipulate software into behaving in unintended and harmful ways. The best way to prevent such attacks is to detect and fix vulnerable code before it can be exploited. GitHub's code scanning capabilities leverage the CodeQL analysis engine to find security vulnerabilities in source code and surface alerts in pull requests – before the vulnerable code gets merged and released.


'Log4Shell' exploits Apple, Twitter and Minecraft

FOX News

Tiktoker Hannah Thelen and cyber journalist Kurt Knutsson join'Fox & Friends' to discuss what steps people can take to protect their data Security experts around the world raced Friday to patch one of the worst computer vulnerabilities discovered in years, a critical flaw in open-source code widely used across industry and government in cloud services and enterprise software. "I'd be hard-pressed to think of a company that's not at risk," said Joe Sullivan, chief security officer for Cloudflare, whose online infrastructure protects websites from malicious actors. Untold millions of servers have it installed, and experts said the fallout would not be known for several days. New Zealand's Computer emergency response team was among the first to report that the flaw in a Java-language utility for Apache servers used to log user activity was being "actively exploited in the wild" just hours after it was publicly reported Thursday and a patch released. The vulnerability, dubbed'Log4Shell,' was rated 10 on a scale of one to 10, the worst possible.


Security Automation: Introduction and Benefits

#artificialintelligence

We realize that Machine Learning is the most famous field in the present age, it is being acknowledged and executed in different enterprises particularly in medical care, ML is performing astoundingly in the clinical field by distinguishing malignant cells in patients at the soonest stage and foreseeing future pandemics or danger flare-up in earlier so the administration could take prudent techniques. Indeed, even to this point, the ML algorithm is helping mankind by contributing its potential in anticipating Covid defilement and in discovering antibodies against the infection. The entirety of this causes Machine Learning to be attractive because we realize that this innovation will be the essence of a future digitalized world. Security Automation is a part of ML which is one among every one of the things that cause us to accept a profession in ML will be emphatically gotten. Security computerization is demonstrating to be the following large thing, later on, after thinking about it you will acknowledge how much significant it is to turn into a piece of it.


Security experts predict a global AI-related cyber attack before year-end

#artificialintelligence

As artificial intelligence technologies become more complex and better integrated with new services and products, executives worldwide are concerned about cyber security vulnerabilities. While AI is a strong tool for security, security experts also predict that malicious actors will utilize artificial intelligence to unleash a global cyber incident in the near future. Today, unauthorized users can get easy access to AI-powered systems to create sophisticated cyber threats. For example, AI chatbots have emerged as a novel doorway to cyber attackers, and the Emotet Trojan malware is hyped as an AI-based cyber threat prototype directed at the financial services sector. A recent global study of early adopters found that over 40 percent of executives have "extreme" or "major" concerns about AI threats, with cybersecurity vulnerabilities leading that list.


Home - Honeycomb SOCAutomation

#artificialintelligence

Utilising automation and orchestration throughout the investigation and triage stage is the most effective form of defence against these mechanised attacks – freeing up your security experts to be security experts. Artificial Intelligence and Machine Learning for the Real World SOCAutomation has a long pedigree of leveraging Artificial Intelligence and Machine Learning to deliver unrivalled, super-fast ROI and vast improvements in Incident Response mitigation and remediation processes.