Home Tags Algorithm

Tag: Algorithm

6 predictions for the future of deep learning

Deep learning is many things, but it isn’t simple.Even if you’re a data scientist who has mastered the basics of artificial neural networks, you...

Dissecting Malware

Four-day course on reverse engineering There are just a handful of reverse engineers clustered at the very top of the information security profession.From March 30...

Google ordered by U.S. court to produce emails stored abroad

Google has been ordered by a federal court in Pennsylvania to comply with search warrants and produce customer emails stored abroad, in a decision...

Crowds are wise enough to know when other people will get...

Enlarge (credit: flickr user: Hsing Wei) The “wisdom of the crowd” is a simple approach that can be surprisingly effective at finding the correct...

Firefox 51 Begins Warning Users of Insecure HTTP Connections

Mozilla Foundation took steps with the release of Firefox 51 on Tuesday to communicate more clearly to users when they land on a HTTP...

The evolution of (and solution to) ransomware

Contrary to popular belief, ransomware has been around for decades.The first malware program to lock up people’s files and ask for a ransom was...

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach

When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware. Cybersecurity is arguably the most rapidly evolving...

Already on probation, Symantec issues more illegit HTTPS certificates

EnlargeOwn Work reader comments 16 Share this story A security researcher has unearthed evidence showing that three browser-trusted certificate authorities owned and operated...

350,000 Twitter bot sleeper cell betrayed by love of Star Wars...

Computer researchers uncover yuuuge dormant army Computer boffins Juan Echeverria and Shi Zhou at University College London have chanced across a dormant Twitter botnet made...

Machine learning versus spam

Machine learning methods are often presented by developers of security solutions as a silver bullet, or a magic catch-all technology that will protect users...

Oracle to Java devs: Stop signing JAR files with MD5

Starting in April, Oracle will treat JAR files signed with the MD5 hashing algorithm as if they were unsigned, which means modern releases of...

SHA-1 End Times Have Arrived

For the past couple of years, browser makers have raced to migrate from SHA-1 to SHA-2 as researchers have intensified warnings about collision attacks moving from...