Heavyweight anti-malware updates on lightweight platforms
Machine learning allows the creation of highly efficient generic rules in scan engines. Smaller, lighter, faster: an improvement of at least 70%
Machine learning allows the creation of highly efficient generic rules in scan engines. Smaller, lighter, faster: an improvement of at least 70%
Comparing the use of threat intelligence feeds with API access to cloud security services and the use of local scanning engines
Cyber threat intelligence feeds make the unknown, known. They make visible the threats that others have already detected but that you’ve not yet seen.
This article is the second in our series looking at machine learning techniques. In the first, we explored supervised and unsupervised machine learning, how they differ and when to apply them. Here we consider what’s meant by Deep Learning and its application to cyber-security.
Welcome to Avira’s new Insights blog. Here the Protection Labs team of Avira will share their ideas and opinions on the technologies that power the cyber-security industry.
Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?
Comparing the use of threat intelligence feeds with API access to cloud security services and the use of local scanning engines
Cyber threat intelligence feeds make the unknown, known. They make visible the threats that others have already detected but that you’ve not yet seen.
Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?
A comprehensive approach to mitigate the problem of an insecure smart home is to secure the network. This is in contrast to a single-minded focus on securing individual IoT devices, which will not be possible, for a long time yet.
2018 will be a year of change: GDPR, threats to the IoT, nation states, feeling increasingly threatened by cryptocurrencies and the Internet giants…
2017 was a transitional year as the online threats and malware grew increasingly focused on individual population segments, and government-funded software exploits escaped their secure confines and wreaked havoc around the globe. This is the year in numbers…