HackDig : Dig high-quality web security articles for hacker

Zimperium and Google Partner to Fight Bad Apps through App Defense Alliance

We are thrilled to announce Google has selected us to help ensure the safety of the millions of apps in the Google Play Store through its App Defense Alliance.    As a member of the App Defense Alliance, Google will provide us access to mobile apps as they are being queued to publish in the Google Play Store. Through our advanced machine learning-based z9 t
Publish At:2019-11-12 00:25 | Read:212 | Comments:0 | Tags:Android Machine Learning Mobile Malware Mobile Security News

Will the Future of Authentication Run Into a Privacy Wall?

Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space. From Jew
Publish At:2019-10-18 10:20 | Read:317 | Comments:0 | Tags:Identity & Access Risk Management Artificial Intelligence (A

Vimeo sued for storing faceprints of people without their say-so

byLisa VaasYou didn’t tell me that you’re collecting and storing my faceprint, you didn’t tell me why or for how long, you didn’t get my written OK to do it, and you haven’t told us how long you’re retaining our biometrics or how we can get you to nuke them, another Illinois resident has said in yet another proposed facial
Publish At:2019-09-26 06:05 | Read:418 | Comments:0 | Tags:Law & order Machine Learning Privacy AI Artificial intellige

Thoughtful Design in the Age of Cybersecurity AI

Reading Time: ~ 3 min. AI and machine learning offer tremendous promise for humanity in terms of helping us make sense of Big Data. But, while the processing power of these tools is integral for understanding trends and predicting threats, it’s not sufficient on its own. Thoughtful design of threat intelligence—design that accounts for the ultimate needs
Publish At:2019-09-19 15:40 | Read:296 | Comments:0 | Tags:Business + Partners Featured Posts Threat Intelligence artif

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole attack example, please see our recent blog,
Publish At:2019-09-19 14:33 | Read:421 | Comments:0 | Tags:iOS Machine Learning Mobile Security Mobile Threat Defense T

The Cognitive Security Glide Path

Over the past year, our industry has seen an explosion in artificial intelligence and cognitive solutions to assist with some of the most challenging cybersecurity problems. In some cases, cognitive solutions can increase analytical capability by 50 percent. With cognitive technology providing such high efficiencies for security teams, people often ask me wh
Publish At:2017-10-02 14:15 | Read:2812 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

False Positives Are a True Negative: Using Machine Learning to Improve Accuracy

Machine learning has grown to be one of the most popular and powerful tools in the quest to secure systems. Some approaches to machine learning have yielded overly aggressive models that demonstrate remarkable predictive accuracy, yet give way to false positives. False positives create negative user experiences that prevent new protection from deploying. IT
Publish At:2017-09-29 11:52 | Read:3078 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Frost & Sullivan Report Highlights Rise in Phishing Attacks

Have you ever unknowingly opened and responded to a phishing email or fallen victim to a phishing attack? A recent report by Frost & Sullivan titled “You’ve Been Phished, Again! Solution: Eliminate the Click-It Temptation,” discussed just how susceptible we all are to these fraudulent attacks and what can be done to avoid them. How Do P
Publish At:2017-09-12 13:50 | Read:2925 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Cognitive Secu

Weighing the Benefits and Challenges of Cognitive Adoption

The data mountain is growing at an unimaginable rate, and making sense of it requires a lot of effort and patience. Unorganized information, or dark data, is difficult to interpret, which results in valuable information passing right by marketers unnoticed and unused. Cognitive technology can help make sense of this data, better align it to business goals an
Publish At:2017-08-31 15:15 | Read:2360 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

The chief information security officer (CISO) faces threats such as compromised users, negligent employees and malicious insiders. For this reason, one of the most important tools in the CISO’s arsenal is user behavior analytics (UBA), a solution that scans data from a security information and event management (SIEM) system, correlates it by user and b
Publish At:2017-08-31 15:15 | Read:2896 | Comments:0 | Tags:CISO Cognitive Security Intelligence & Analytics Artificial

Man With Machine: Harnessing the Potential of Artificial Intelligence

When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification. Originally defined by Alan Turing, AI initially referred to any machine that co
Publish At:2017-08-28 12:55 | Read:3165 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Responsive Machine Learning: The Necessary Evolution of Endpoint Security

Machine learning is changing the way industries address critical challenges by using the combined power of automation, cloud-based scalability and specialized programming to surface unexpected relationships and insights. With thousands of new malicious programs emerging every day, security solutions that integrate responsive machine learning can identify an
Publish At:2017-07-18 13:40 | Read:2965 | Comments:0 | Tags:Cognitive Endpoint Cognitive Computing Cognitive Security En

Connecting Fintech Security Perceptions to Reality

The fintech industry is changing due to both internal forces and external demands. Both financial institutions and their customers are wary of changes that can affect security and, therefore, the state of their money. Financial industry chief information security officers (CISOs) need to be aware of these key trends and understand how they affect their busi
Publish At:2017-07-18 13:40 | Read:2888 | Comments:0 | Tags:Banking & Financial Services CISO Blockchain Chief Informati

Top Cybersecurity Trends for the First Half of 2017

Depending on how you look at it, security has thus far had another stellar year in terms of visibility across industry and society, criticality to business, and busyness for IT and security professionals. Still, we’re constantly behind the eight ball when it comes to visibility and control, the two pillars of security that no one seems to have mastere
Publish At:2017-07-17 19:15 | Read:2974 | Comments:0 | Tags:CISO Best Practices Cybersecurity Machine Learning Malware S

Zero Packet Inspection

Introduction In this blogpost I describe the history of z9, our detection engine. I will show its performance over reference data sets commonly used in the machine learning community. I’ll then describe how we apply it to detect networks attacks without any type of packet inspection. Eventually, we encourage you to participate by helping us gather and
Publish At:2017-07-11 22:35 | Read:5606 | Comments:0 | Tags:0-Packet Android iOS Machine Learning Mobile Malware Mobile

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud