Long Tail Analysis: A New Hope in the Cybercrime Battle
Looking for niche anomalies in an automated way with AI and machine learning is the future.
Looking for niche anomalies in an automated way with AI and machine learning is the future.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The coronavirus (Covid-19) pandemic will accelerate rollout and takeup of narrowband IoT (NB-IoT), which is building a head of steam already. NB-IoT passed 100 million connections in January on the back of a continuing surge in China, according to the GSMA, and is on track to catch LTE-M as the dominant IoT-dedicated cellular standard by…
Earlier this year, TikTok-owner Bytedance launched its music app Resso in India. At that time, Resso’s team said that at the moment there’s no plan for integration between both apps. However, that seems to be changing. TikTok usually shows the original soundtrack used in the clip in a ticker below. But now, it also includes…
Today, cybersecurity researchers shed light on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia. Bitdefender said the intelligence-gathering operations were conducted by Chafer APT (also known as APT39 or Remix Kitten), a threat actor known for its attacks on telecommunication and travel industries in the Middle East to collect…
A whistleblower who revealed Apple contractors were listening in on Siri recordings has gone public following a lack of action against the company. Thomas le Bonniec, a former Apple contractor at the firm’s Cork office in Ireland, believes that the company should be held legally responsible for breaching users’ privacy. Le Bonniec was employed by…
Peachtree Corners in Georgia in the US has launched a fleet of remote controlled electric scooters that can be delivered to customers and returned to parking spots by tele-operators – working from an office in Mexico City. These twin challenges – to locate scooters for usage, and return them for safe parking, charging and cleaning…
Google and Apple have launched the first phase of their COVID-19 contact-tracing tech: an Exposure Notification API that public health agencies can use to build their own mobile apps. The software uses Bluetooth to alert people if they’ve been in contact with someone who has the virus. When a user declares that they’ve likely caught COVID-19, the system sends a notification…
The advent of the Covid-19 pandemic and the impact on our society has resulted in many dramatic changes to how people are traveling, interacting with each other, and collaborating at work. There are several trends taking place as a consequence of the outbreak, which has only continued to heighten the need for the tightest possible…
Apple has started rolling out the iOS 13.5 update for iPhones last night. It brings one of the most sought after updates in the time of this pandemic — the ability to easily unlock your phone while wearing a face mask. The iPhone-maker hasn’t developed any technology to make Face ID work when someone’s wearing…
The operators behind the Toll Group attack are taking applications for technically advanced partners.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea