Blog
Categories
The more your new automated assistant can do, the more harm it could cause.
As AI broadens its reach across more devices, cybersecurity risks expand as well. Hardware can set hard limits on what AI can and cannot do.
Hacks of voting machines draw headlines, but it after votes are cast that the real vulnerability begins. Election data must be protected as it is shared with central authorities.
For decades, hackers have been able to reach across the digital divide, using cyberattacks with targets in the real world. These ‘kinetic cyber’ attacks are increasing in sophistication and severity.
Malware has evolved in the past three decades. The sophistication, scope, and volume of threats has increased so significantly that anti-malware software struggles to keep up. Here we look at the evolution of malware since it first appeared in 1986 to its astounding growth in 2020.