When I think of the unique challenges faced by AI researchers in security, it reminds me of an excerpt from the Harry Potter series. At the beginning of Book 6, the Minister of Magic pays a visit to the (muggle) Prime Minister to warn him about evil deeds being carried out by dark wizards. The Prime Minister is understandably scared and confused. In frustration, he implores, “But for heaven’s sake—you’re wizards! You can do magic! Surely you can sort out—well—anything!” The Minister of Magic replies pragmatically, “The trouble is, the other side can do magic too.”
If Santa didn’t bring you a new top-of-the-line laptop this year, no need to pout. Follow these tips to keep your PC in fighting form for 2018.
Last month, we shared security predictions for 2018 from a few of our Avast Business partners. We also asked about top challenges they will face in the coming year, securing IT environments and protecting their small and medium-sized business (SMB) cli…
There’s no time like the present to gift yourself with a New Year’s resolution that will pay off in countless ways. Over this last year, you’ve likely heard more than enough headline-breaking news about phishing, ransomware, and—to use some urban slang—getting “pwned”.
Details have emerged this week regarding two different—and both substantial—security flaws in almost every computer processor in use today. This affects Windows, Mac, Linux, Android, and iOS. It’s important to note that as of yet, no malware or cyberattack has been associated with these flaws, but now that the information is in the public domain, that could change. Either of the flaws could lead to your computer’s memory being compromised, which means sensitive data—passwords, photos, credit card details—can be accessed and stolen. Here’s a breakdown of the two vulnerabilities:
AV-Test, the Independent IT-Security Institute, regularly conducts impartial studies on all leading cybersecurity products on the market. The purpose is to keep consumers aware of what’s performing as promised, and what’s not.
In the ongoing battle against SMB security threats, security assessments are a critical tool in IT service portfolios. Effective, easy-to-use assessment tools can add new value by providing a way to continually identify and resolve security issues acro…
I was thinking about Jeff Weiner’s question to identify a single product or feature that you cannot do without. For me, it is easy to pay that accolade to Tesla’s self-driving autopilot. Every time I am stuck in Bay Area traffic, I allow the car to drive itself while I engage in creative thinking or relax with an audiobook. This is the perfect example of what technology should do—take on the monotonous work and do it better than a human being can.