Remove 2018 Remove Antivirus Remove Artificial Intelligence Remove Blog
article thumbnail

Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

The Last Watchdog

A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities. When antivirus (AV) software first arrived in the late 1980s, the science of combating computer viruses was very straightforward. This column originally appeared on Avast Blog.).

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. This series of posts is modeled after the talk I gave at RSA 2018.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. This series of posts is modeled after the talk I gave at RSA 2018.

article thumbnail

Purple Fox rootkit now bundled with Telegram installer

Malwarebytes

Then User Account Control (UAC) is disabled, specific antivirus initiations are blocked, and information about security tools on the affected system are gathered and sent to a hardcoded command and control (C2) address. Purple Fox is the name given to a malware family that has been in constant development ever since it was discovered in 2018.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. Facebook Plans on Backdooring WhatsApp [link] — Schneier Blog (@schneierblog) August 1, 2019. — Jack Daniel (@jack_daniel) October 10, 2018. jaysonstreet) March 3, 2018. Dave Kennedy | @hackingdave.

article thumbnail

MY TAKE: What it takes to beat cybercrime in the age of DX and IoT: personal responsibility

The Last Watchdog

2018 was no exception. In 2018, as businesses raced to mix and match cloud-services delivered by the likes of Amazon Web Services, Microsoft Azure and Google Cloud, unforeseen gaps in classic network security systems began to turn up. The “Meltdown” and “Spectre” exploits paved the way for so-called “microcode hacks” in early 2018.