Tech

Aesthetic Preference Recognition as a Potential Authentication Factor

A new paper from Israel has proposed an authentication scheme based on a user's aesthetic preferences, wherein the user calibrates the system one time...

Biometric Authentication by Grinding Your Teeth

Two recent research papers from the US and China have proposed a novel solution for teeth-based authentication: just grind or bite your teeth a...

Anticipating New Spam Domains Through Machine Learning

Researchers from France have devised a method for identifying newly-registered domains that are likely to be used in a ‘hit and run' fashion by...

Stealing Machine Learning Models Through API Output

New research from Canada offers a possible method by which attackers could steal the fruits of expensive machine learning frameworks, even when the only...

How Hackers Are Wielding Artificial Intelligence

AI has proven itself to be a value-adding technology across the global economy.As businesses found themselves scrambling to adapt to current events over the...

Threat Intelligence Best-Practice Tips – Unite.AI

A lot of people say threat intelligence (TI) tastes good, but few understand how to cook it. There are even fewer of those who...

How AI Detects Online Fraud: Methods & Effectiveness

Virtually every industry in the business environment is investing in or at least considering making investments in artificial intelligence (AI), including machine learning (ML),...

Data Poisoning: Is There a Solution?

Data sets are the foundation for AI. Data allows AI to make decisions and analyze trends because they have numerous data points to reference...

AI and Spam: How Artificial Intelligence Protects Your Inbox

Conversations around AI often include its role in cybersecurity prevention. AI is a powerful, indispensable tool in fighting cyber threats, but it can also...