Search Results for: Artificial Intelligence Blog Post Hacking with Artificial Intelligence December 17, 2019 Artificial intelligence (AI) have entered the everyone’s life, and we can see many AI-related products everywhere, such as Siri, AI... Blog Post AI Isn’t Good Enough When Lives Are on the Line, Experts Warn. June 4, 2019 During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation... Blog Post The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according... Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the... Blog Post NY Metro InfraGard Members Alliance & LIFARS Present: Cyber Threats In The Time Of COVID-19 July 19, 2020 From Ransomware to Nation States, what are we seeing and how do we stop it? Case Studies of Recent Cyber... Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Blog Post Japan Takes Emergency Cybersecurity Measures for the 2020 Olympics February 5, 2020 Japanese cybersecurity will face a lot of challenges this year, as Japan will host two major sports events: the Tokyo... Blog Post Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions... Blog Post A Banking Trojan is Back Because of COVID-19 April 1, 2020 COVID-19 is currently the most common and popular topic in cyberattacks. Recently, the Zeus Sphinx banking Trojan program has been... Blog Post What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress... Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s... Blog Post Army is advancing facial recognition technology September 2, 2019 “The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it’s been... Blog Post The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Blog Post Honeypots & Honeynets April 23, 2020 Because of the increasing complex evasion techniques and protocols with encryption technology for preventing eavesdropping, intrusion detection systems provide less...
Blog Post Hacking with Artificial Intelligence December 17, 2019 Artificial intelligence (AI) have entered the everyone’s life, and we can see many AI-related products everywhere, such as Siri, AI...
Blog Post AI Isn’t Good Enough When Lives Are on the Line, Experts Warn. June 4, 2019 During Infosecurity Europe in London this week, cybersecurity experts sounded off on worries about artificial intelligence being used for nation...
Blog Post The Top Six Cyber Security Threats for 2020 August 19, 2020 The estimated cost of cyber crimes across the globe will reach up to $6 trillion a year by 2021, according...
Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the...
Blog Post NY Metro InfraGard Members Alliance & LIFARS Present: Cyber Threats In The Time Of COVID-19 July 19, 2020 From Ransomware to Nation States, what are we seeing and how do we stop it? Case Studies of Recent Cyber...
Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Blog Post Japan Takes Emergency Cybersecurity Measures for the 2020 Olympics February 5, 2020 Japanese cybersecurity will face a lot of challenges this year, as Japan will host two major sports events: the Tokyo...
Blog Post Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions...
Blog Post A Banking Trojan is Back Because of COVID-19 April 1, 2020 COVID-19 is currently the most common and popular topic in cyberattacks. Recently, the Zeus Sphinx banking Trojan program has been...
Blog Post What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress...
Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s...
Blog Post Army is advancing facial recognition technology September 2, 2019 “The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it’s been...
Blog Post The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
Blog Post Honeypots & Honeynets April 23, 2020 Because of the increasing complex evasion techniques and protocols with encryption technology for preventing eavesdropping, intrusion detection systems provide less...