A new collaboration between a researcher from the United States' National Security Agency (NSA) and the University of California at Berkeley offers a novel method for...
A lot of people say threat intelligence (TI) tastes good, but few understand how to cook it. There are even fewer of those who know which...
Even though iOS has strong built-in protection against malware, your Apple iPhone or iPad is not completely immune. There are still many malicious websites, ads, web...
Cybercrimes are hitting an all-time high, making it more important than ever to have a strong AI-powered antivirus program for your Windows PC. AI-powered software relies...
AI has proven itself to be a value-adding technology across the global economy. As businesses found themselves scrambling to adapt to current events over the last...
New research from Canada offers a possible method by which attackers could steal the fruits of expensive machine learning frameworks, even when the only access to...
Researchers from France have devised a method for identifying newly-registered domains that are likely to be used in a ‘hit and run' fashion by high-volume email...
A new research collaboration between the US and China has probed the susceptibility to deepfakes of some of the biggest face-based authentication systems in the world,...
by David Ryan, Vice President of Sales, Cynamics Massive amounts of data are being generated daily; by some accounts, a staggering 2.5 quintillion bytes of data...
A joint academic research project from the United States has developed a method to foil CAPTCHA* tests, reportedly outperforming similar state-of-the-art machine learning solutions by using...
History suggests that eventually the ‘open' age of computer vision research, where reproducibility and favorable peer review are central to the development of a new initiative,...
By Dr. Aviv Yehezkel, co-founder and CTO, Cynamics From hospitals to schools to meat packing plants, no industry is insignificant to ransomware attackers. Ransomware will cost...
Researchers from China have developed a method to synthesize near photoreal images of people without cameras, by using radio waves and Generative Adversarial Networks (GANs). The...
Researchers have developed a method to copy the characteristics of a victim's web browser using browser fingerprinting techniques, and thereafter ‘impersonate' the victim. The technique has...
Researchers have developed a method to deliver a Facebook ad campaign to just one person out of 1.5 billion, based only on the user's interests, and...