Latest Articles

Machine Learning

Applying AI: weighing up Deep Learning

Applying AI: weighing up Deep Learning

This article is the second in our series looking at machine learning techniques. In the first, we explored supervised and unsupervised machine learning, how they differ and when to apply them. Here we consider what’s meant by Deep Learning and its application to cyber-security.

3 months ago 3 min read
Featured Stories

Welcome to Avira’s Insights Blog

Welcome to Avira’s Insights Blog

Welcome to Avira’s new Insights blog.  Here the Protection Labs team of Avira will share their ideas and opinions on the technologies that power the cyber-security industry.

4 months ago 1 min read
Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

4 months ago 3 min read

We think you will find interesting

Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

4 months ago 3 min read
IoT

Should I be (more) paranoid after my IoT Christmas?

Should I be (more) paranoid after my IoT Christmas?

A comprehensive approach to mitigate the problem of an insecure smart home is to secure the network. This is in contrast to a single-minded focus on securing individual IoT devices, which will not be possible, for a long time yet.

4 months ago 3 min read
Corporate Responsibility

2018: Watch your step when the chips are down

2018: Watch your step when the chips are down

2018 will be a year of change: GDPR, threats to the IoT, nation states, feeling increasingly threatened by cryptocurrencies and the Internet giants…

4 months ago 3 min read
Featured Stories

2017: Threats got more precise – and pervasive

2017: Threats got more precise – and pervasive

2017 was a transitional year as the online threats and malware grew increasingly focused on individual population segments, and government-funded software exploits escaped their secure confines and wreaked havoc around the globe. This is the year in numbers…

4 months ago 3 min read