Security News

At a Wednesday session at Black Hat USA 2020, researchers with FireEye demonstrated how freely-available, open-source tools - which offer pre-trained natural language processing, computer vision, and speech recognition tools - can be used to create malicious the synthetic media. Social media companies often do not require high bars of credibility, and offer a platform for content to go viral, allowing anyone to create fake media that is believable.

Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism, according to a new UCL report. The study identified 20 ways AI could be used to facilitate crime over the next 15 years.

Throughout the data lifecycle there are a variety of risks and considerations to manage. Our research shows that exposure of just a single terabyte of data could cost you $129,324; now think about how many terabytes of data your organization stores today.

Machine learning already powers image recognition, self-driving cars, and Netflix recommendations. The Hacker News recently partnered with professional trainers to offer their popular artificial intelligence online training programs at hugely discounted prices.

Machine learning already powers image recognition, self-driving cars, and Netflix recommendations. The Hacker News recently partnered with professional trainers to offer their popular artificial intelligence online training programs at hugely discounted prices.

CalypsoAI, a California-based company that specializes in artificial intelligence and machine learning cybersecurity, announced this week that it has raised $13 million in a Series A funding round. Founded in 2018, CalypsoAI offers a software platform, named Vespr, that enables customers to validate, monitor and secure their AI. Vespr is described as an integrated model accreditation and risk management system that can be used to create, test and deploy models with built-in validation and security.

A working group led by two computer scientists Wolfgang Maass and Robert Legenstein of TU Graz has adopted this principle in the development of the new machine learning algorithm e-prop. Learning is a particular challenge for such less active networks, since it takes longer observations to determine which neuron connections improve network performance.

Vickery also talks to Threatpost about fringe data breach discoveries he's encountered over the last few years, as well as how the process of data breach disclosure is shifting and the best first steps companies can take once a data breach has been discovered. So just for all of our listeners, Chris works at UpGuard, and he has a great track record of discovering major data breaches and vulnerabilities across the digital landscape.

Lynx Analytics announces the open source release of its Complete Graph Data Science Platform, LynxKite 4.0, after years of development and successful deployments with customers. With rapidly growing availability of network and relationship data as well as new graph deep learning technologies, Graph AI is the next frontier of machine learning as advocated by leading machine learning experts.

More than 1,000 technology experts and academics from organizations such as MIT, Microsoft, Harvard and Google have signed an open letter denouncing a forthcoming paper describing artificial intelligence algorithms that can predict crime based only on a person's face, calling it out for promoting racial bias and propagating a #TechtoPrisonPipeline. The paper describes an "Automated computer facial recognition software capable of predicting whether someone is likely going to be a criminal," according to a press release about the research.