article thumbnail

New Cyberthreats for 2021

Adam Levin

Ransomware was a relatively obscure form of malware until the early 2010s , but it has increased in scope and the amount of damage it has caused year after year, aided by a proliferation of botnets , cryptocurrencies , and sophisticated criminal enterprises. A deepfake can be a digital image, video, or audio file.

IoT 130
article thumbnail

ChatGPT: Cybersecurity friend or foe?

Malwarebytes

ChatGPT—the much-hyped, artificial intelligence (AI) chatbot that provides human-like responses from an enormous knowledge base—has been embraced practically everywhere, from private sector businesses to K–12 classrooms. As of November 2022, people can no longer ignore the artificial elephant in the room.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: What it takes to beat cybercrime in the age of DX and IoT: personal responsibility

The Last Watchdog

This makes Vidar capable of stealing cryptocurrencies from digital wallets. There is not much that an end user can currently do to protect themselves against this type of attack, except to not run any software from a shady source, even if it does not raise any antivirus flag.” ” Shared burden.

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. Data poisoning attacks. bitcoin prices.

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. Data poisoning attacks. bitcoin prices.