Author: Eveline Meijer

“Cybercriminals abuse encrypted data traffic more often.

“Cybercriminals abuse encrypted data traffic more often.

Cyber threats are on the increase and are becoming increasingly sophisticated. That's what security company Fortinet says in its Global Threat Landscape Report for the third quarter of this year. Encrypted data traffic, for example, is being abused more and more often and there is a growing number o... Read more

date5 years ago
Samsung uses AI for medical imaging to help radiologists

Samsung uses AI for medical imaging to help radiologists

Samsung has applied its artificial intelligence (AI) algorithms to its imaging devices. This allows doctors and radiologists to make more accurate diagnoses, according to the company. At the Radiological Society of North America 2018 Annual Meeting (RSNA 2018) in Chicago, the company showed various ... Read more

date5 years ago

Rowhammer attacks can bypass ECC memory protection

Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer attack, which makes the attack successful on ECC memory. Rowhammer is a group of exploits that exploit an error in the design of modern memory cards. A memory card stores temporary data as s... Read more

date5 years ago
Google merges with DeepMind Health, privacy advocates worry

Google merges with DeepMind Health, privacy advocates worry

Alphabet plans to engage DeepMind Health in its Google Search department. As a result, privacy advocates are critical of the plan. DeepMind Health has access to patient files, says Bloomberg. Data protection advocates are angry about the plan. Alphabet previously promised to keep DeepMind Health - w... Read more

date5 years ago
“It only takes bots seconds to spread disinformation.

“It only takes bots seconds to spread disinformation.

According to new research by Indiana University, social media bumps only take a few seconds to spread disinformation, says Ars Technica. The researchers studied tweets for this purpose shortly after the American presidential elections of 2016. Shortly after those elections, President Donald Trump sa... Read more

date5 years ago
HPE Aruba introduces new access points and access switches

HPE Aruba introduces new access points and access switches

HPE Aruba has unveiled a new range of wireless access points and associated access switches. It concerns 802.11ax IoT-ready access points. In addition, it has new innovations in the field of security, smart power management and AI-powered automation and service assurance. The wireless access points... Read more

date5 years ago

Emotet malware includes unique infrastructure to prevent down-time

According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infrastructure of its server in two separate clusters. Researchers analyzed 571 samples of the group's malware. It allowed them to extract the IP addresses of 721 Emotet command-and-control (C&... Read more

date5 years ago
IBM: ‘Our techniques can solve limits in chip development’.

IBM: ‘Our techniques can solve limits in chip development’.

IBM has created materials and processes that can help improve the efficiency of the production of 7nm and smaller chips. That's what ZDNet reports. This is intended to transcend the limits of chip development. Big Blue researchers are working on challenges in the emerging field of area-selective de... Read more

date5 years ago
AWS adds new AI algorithms to SageMaker

AWS adds new AI algorithms to SageMaker

Amazon Web Services (AWS) has expanded its SageMaker Artificial Intelligence (AI) service with new features that allow developers to automate key aspects of their work. SageMaker was introduced last year to reduce the amount of work involved in creating AI algorithms. The update extends the number o... Read more

date5 years ago
1 119 120 121 122 123 145