Data sets are the foundation for AI. Data allows AI to make decisions and analyze trends because they have numerous data points to reference for deductive...
Virtually every industry in the business environment is investing in or at least considering making investments in artificial intelligence (AI), including machine learning (ML), one of...
A lot of people say threat intelligence (TI) tastes good, but few understand how to cook it. There are even fewer of those who know which...
AI has proven itself to be a value-adding technology across the global economy. As businesses found themselves scrambling to adapt to current events over the last...
New research from Canada offers a possible method by which attackers could steal the fruits of expensive machine learning frameworks, even when the only access to...
Researchers from France have devised a method for identifying newly-registered domains that are likely to be used in a ‘hit and run' fashion by high-volume email...
Two recent research papers from the US and China have proposed a novel solution for teeth-based authentication: just grind or bite your teeth a bit, and...
A new paper from Israel has proposed an authentication scheme based on a user's aesthetic preferences, wherein the user calibrates the system one time by rating...
by David Ryan, Vice President of Sales, Cynamics Massive amounts of data are being generated daily; by some accounts, a staggering 2.5 quintillion bytes of data...
A joint academic research project from the United States has developed a method to foil CAPTCHA* tests, reportedly outperforming similar state-of-the-art machine learning solutions by using...
By Dr. Aviv Yehezkel, co-founder and CTO, Cynamics From hospitals to schools to meat packing plants, no industry is insignificant to ransomware attackers. Ransomware will cost...
Attacking image recognition systems with carefully-crafted adversarial images has been considered an amusing but trivial proof-of-concept over the last five years. However, new research from Australia...
Researchers have developed a method to copy the characteristics of a victim's web browser using browser fingerprinting techniques, and thereafter ‘impersonate' the victim. The technique has...
Researchers in Italy and the Netherlands have developed a machine learning method capable of inferring the PIN number that a bank customer puts into an ATM,...
An investigation into the defrauding of $35 million USD from a bank in the United Arab Emirates in January of 2020 has found that deepfake voice...