Law enforcement agencies dismantled the infrastructure of Emotet, a notorious email-based Windows malware behind several botnet-driven spam campaigns.
Law enforcement agencies dismantled the infrastructure of Emotet, a notorious email-based Windows malware behind several botnet-driven spam campaigns.
Well, maybe they would be good memories. 😃
Quantum computers, according to experts, will one day be capable of performing incredible calculations and nearly unfathomable feats of logic. In the near future, we know they’ll help us discover new drugs to fight disease and new materials to build with. But the far future potential for these enigmatic machines is as vast as the universe itself.
The realm of classic science fiction is littered with ideas that today’s experts believe lie within the realm of reality – if not today’s reality, then perhaps tomorrow’s quantum computer-laden one. One of those ideas comes straight out of a Paul Verhoeven film from over thirty years ago: Total Recall.
Controversy brewing?
But the site also touches on a sensitive topic in the cyber-security industry. For decades, security researchers have been secretly hacking back against malware operators.
Just like malware sometimes uses bugs in legitimate apps to infiltrate systems, security firms have also used bugs in malware code to infiltrate the attacker’s infrastructure.
In 2021 Trend Micro predicts that cybercriminals will look to home networks as a critical launch pad to compromising corporate IT and IoT networks.
The maker of a defunct cloud photo storage app that pivoted to selling facial recognition services has been ordered to delete user data and any algorithms trained on it, under the terms of an FTC settlement.
The regulator investigated complaints the Ever app — which gained earlier notoriety for using dark patterns to spam users’ contacts — had applied facial recognition to users’ photographs without properly informing them what it was doing with their selfies.
Under the proposed settlement, Ever must delete photos and videos of users who deactivated their accounts and also delete all face embeddings (i.e. data related to facial features which can be used for facial recognition purposes) that it derived from photos of users who did not give express consent to such a use.
China is positioning itself to be a world leader in quantum technology, including drafting international standards.
The following predictions provide insights into how cybersecurity will evolve in 2021:
55% of enterprise executives plan to increase their cybersecurity budgets in 2021, and 51% are adding full-time cyber staff in 2021 according to PwC.
Deep learning has come a long way since the days when it could only recognize handwritten characters on checks and envelopes. Today, deep neural networks have become a key component of many computer vision applications, from photo and video editors to medical software and self-driving cars.
Roughly fashioned after the structure of the brain, neural networks have come closer to seeing the world as humans do. But they still have a long way to go, and they make mistakes in situations where humans would never err.
These situations, generally known as adversarial examples, change the behavior of an AI model in befuddling ways. Adversarial machine learning is one of the greatest challenges of current artificial intelligence systems. They can lead to machine learning models failing in unpredictable ways or becoming vulnerable to cyberattacks.