Los Alamos AI Identifies 29 Times More Types of Malware

Los Alamos National Laboratory is using artificial intelligence to address several critical shortcomings in large-scale malware analysis, making significant advancements in the classification of Microsoft Windows malware and paving the way for enhanced cybersecurity measures. Using their approach, the team set a new world record in classifying malware families. “Artificial intelligence methods developed for cyber-defense …

Read more

Apple, WhatsApp and Signal Will Refuse UK Government Backdoor into Encrypted Messaging

The UK government wants a backdoor into end-to-end encryption communication applications, but Apple says they would rather remove iMessenger and Facetime from iPhones in the UK. Apple says it will remove services such as FaceTime and iMessage from the UK rather than weaken security if new proposals are made law and acted upon. The UK …

Read more

Ransomeware Attack Shuts Key East Coast Gas Pipeline

Colonial Pipeline has had a cyberattack involving ransomeware from an Eastern European-based criminal gang called DarkSide. Colonial Pipeline has temporarily shutdown 2.5 million barrels per day of pipelines. This is about 12-15% of US oil capacity. On May 7, the Colonial Pipeline Company learned it was the victim of a cybersecurity attack. We have since …

Read more

Will We Ever Get Our Internet Privacy Back? (Spoiler: Yes, If We Demand It)

Guest Post by Philip Piletic In the earliest days of the internet, nobody thought much about the concept of privacy. After all, surfing the internet was a mostly anonymous exercise. Advertising was static and one-size-fits-all. And there were no social media sites commanding user bases in the billions. But along the way, things began to …

Read more

Is the Real Estate Industry Crossing a Privacy Line With Biometrics?

Biometric data is derived from measuring and calculating unique human characteristics like fingerprints and palm prints. For decades, these basic forms of biometric data have been used to grant access to secure areas. For example, employees are often required to scan their face, eyes, palm, or thumb to gain access to high-security areas. Similar to …

Read more