All articles

Machine Learning

Applying AI: weighing up Deep Learning

Applying AI: weighing up Deep Learning

This article is the second in our series looking at machine learning techniques. In the first, we explored supervised and unsupervised machine learning, how they differ and when to apply them. Here we consider what’s meant by Deep Learning and its application to cyber-security.

2 years ago 3 min read
Featured Stories

Welcome to Avira’s Insights Blog

Welcome to Avira’s Insights Blog

Welcome to Avira’s new Insights blog.  Here the Protection Labs team of Avira will share their ideas and opinions on the technologies that power the cyber-security industry.

2 years ago < 1 min read
Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

2 years ago 3 min read
IoT

What’s so dystopian about a smart TV?

What’s so dystopian about a smart TV?

Smart TVs know a lot about their owners, should their owners trust them?  A way to intelligently monitor and control the trustworthiness of IoT devices like smart TVs is needed.

2 years ago 2 min read
IoT

Turning up the heat on the smart thermostat

Turning up the heat on the smart thermostat

A smart thermostat and the team in the datacenter that supports it, knows a lot about the user – perhaps too much. The potential for hacking incidents to occur underlines the importance of security for all of our connected devices.

2 years ago 3 min read
IoT

Should I be (more) paranoid after my IoT Christmas?

Should I be (more) paranoid after my IoT Christmas?

A comprehensive approach to mitigate the problem of an insecure smart home is to secure the network. This is in contrast to a single-minded focus on securing individual IoT devices, which will not be possible, for a long time yet.

2 years ago 3 min read
IoT

Beyond the device: securing the IoT

Beyond the device: securing the IoT

Smart homes are probably vulnerable homes: Whose responsibility is it to secure the home – the home owner? The manufacturer of the device? How about the Internet service provider – after all, they are likely to suffer more than most when things go wrong.

2 years ago 3 min read
Corporate Responsibility

2018: Watch your step when the chips are down

2018: Watch your step when the chips are down

2018 will be a year of change: GDPR, threats to the IoT, nation states, feeling increasingly threatened by cryptocurrencies and the Internet giants…

2 years ago 3 min read
IoT

2017: Threats got more precise – and pervasive

2017: Threats got more precise – and pervasive

2017 was a transitional year as the online threats and malware grew increasingly focused on individual population segments, and government-funded software exploits escaped their secure confines and wreaked havoc around the globe. This is the year in numbers…

2 years ago 3 min read