Analysis 

AI and Cybersecurity: combining data with human expertise

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and AI-based medical diagnostics and prognoses. But can artificial intelligence be used effectively to combat cyberattacks? AI-influenced cybersecurity capabilities have evolved well beyond AI washing (a derogatory term coined to describe a technology billed as AI but which in reality, as InfoWorld put it, is “an attempt to make dumb…

Read More

Five Providers of Conversational AI Software Platforms Named IDC Innovators

International Data Corporation (IDC) today published an IDC Innovators report profiling five technology providers that are considered key emerging vendors in the conversational AI platforms market. The five companies named as IDC Innovators are Personetics, Kore.ai, Artificial Solutions, Inbenta, and CogniCor. Conversational AI platforms are used to build applications that answer questions, provide advice and/or recommendations using natural language processing and other dialog related technologies. The market for intelligent conversational assistance is growing rapidly, fueled by the use and acceptance of consumer tools like Google Assistant, Apple’s Siri, and Amazon’s…

Read More

Cyber-Criminals Are On The Offensive During The World Cup: Wallchart Phishing Campaign Exploits Soccer Fans

Keeping track of the World Cup can get overwhelming Cyber criminals are keenly aware of this pain point, seeking to use the buzz around the World Cup as cover for their sneaky attacks. Check Point researchers have identified a phishing campaign targeting soccer fans, using the email subject line of “World_Cup_2018_Schedule_and_Scoresheet_V1.86_CB-DL-Manager.”  This type of phishing scheme exploits victims by downloading an infected FIFA World Cup schedule and results checker onto their PCs. When opened, the attachment uses a malware variant called ‘DownloaderGuide,’ a known downloader of potentially unwanted programs (PUPs)…

Read More
Analysis 

What Exactly Is The Internet Of Things and How Will It Affect Your Future?

Technology surrounds us. From the phones in our hands to the televisions on our walls and the appliances in our kitchen, new tech comes at us from every angle. Many of us fail to fully understand just how advanced those everyday conveniences are now and the extent of what they will be in the future. Four simple words can help clarify where we’re at and the limitless possibilities of where we’re going. The Internet of Things. Now is the point of the conversation when many say, “sure, the internet, it’s…

Read More
News 

CE China 2018 successfully started, powered by IFA Retail University briefings about latest innovations and Chinese market insights

CE China 2018, a global IFA brand, successfully started today with trade visitors and consumers experiencing international as well as Chinese brands showcasing their latest products and innovations at Shenzhen Convention and Exhibition Center. Shenzhen/Berlin, 3 May 2018 – A major element on day one was the premier of IFA Retail University, jointly hosted by Chinese retail giant Suning. While attracting specialized retailers and experts, it provided deep insights from leading global brands into their newest developments, strategies and market stats. Eleven companies in total performed on stage, including GfK,…

Read More
Comments & opinions 

Digital transformation creates competitive advantage and new revenue streams for smart machines

New industrial technologies in the form of smart machines, smart factories, cloud-based services and advanced data analytics have begun to transform machine shops and factory landscapes across the globe.  The early payback from implementing such systems has primarily been in the form of increased efficiencies. However, improved efficiencies do not necessarily translate into competitive advantage. If a one-dimensional view of potential benefits is adopted, the long-term opportunities for strategic differentiation will be relatively small. After all, competitors also evolve while a particular company improves its efficiency through deployment of one or…

Read More
Analysis 

Guest Accounts Gain Full Access on Chrome RDP

Chrome Remote Desktop is an extension to the Chrome browser that allows users to remotely access another computer through Chrome browser or a Chromebook. It is fully cross-platform, and supports macOS versions from OS X 10.6 (2009) and above, all from the Chrome browser on virtually any device. However, one of our security analysts recently noticed an unexpected behavior in Google Chrome Remote Desktop Application on macOS. The strange behaviour allows, in some cases, a ‘Guest user’ to login as Guest and yet receive an active session of another user…

Read More
Analysis 

Mitigating CPU Vulnerabilities: Removing the OS Blindfold

OS Level Solutions Are Not Enough The recent Meltdown and Spectre vulnerabilities target weaknesses of the CPU rather than the Operating System, or the applications that run on it. (See here for background on how these vulnerabilities work). Since they do not involve the Operating System, solutions that monitor at that level, such as traditional sandboxes, will be incapable of detecting these types of attack. A lower level framework is required in order to properly identify and mitigate these attacks. Using The CPU Level Framework To Mitigate The Spectre and Meltdown…

Read More

Blockchain Regtech Leader Coinfirm to Launch AMLT Token for Anti-Money Laundering Compliance

Coinfirm, a global leader in blockchain AML/CTF and compliance is releasing a dedicated token, AMLT, to deliver one of the most needed solutions for blockchain adoption by allowing market participants to help determine the potential risk of others. Coinfirm has been raising the standards of tech solutions for compliance in the blockchain and financial ecosystem through their AML/CTF Platform. The platform delivered a solution for AML/CTF needs for cryptocurrency and blockchain-related companies that allows for the safe adoption of cryptocurrencies and blockchain by players in the traditional economy. AMLT adds…

Read More

A New IoT Botnet Storm is Coming

New cyber-storm clouds are gathering. Check Point Researchers have discovered of a brand new Botnet evolving and recruiting IoT devices at a far greater pace and with more potential damage than the Mirai botnet of 2016. IoT Botnets are Internet connected smart devices which have been infected by the same malware and are controlled by a threat actor from a remote location. They have been behind some of the most damaging cyberattacks against organizations worldwide, including hospitals, national transport links, communication companies and political movements. While some technical aspects lead…

Read More
error: https://exclusivenews.ogledalo.rs- Content is protected !!