Data, Surveillance, and the AI Arms Race

According to foreign policy experts and the defense establishment, the United States is caught in an artificial intelligence arms race with China — one with serious implications for national security. The conventional version of this story suggests that the United States is at a disadvantage because of self-imposed restraints on the collection of data and the privacy of its citizens,… Continue reading Data, Surveillance, and the AI Arms Race

Data, Surveillance, and the AI Arms Race

According to foreign policy experts and the defense establishment, the United States is caught in an artificial intelligence arms race with China — one with serious implications for national security. The conventional version of this story suggests th… Continue reading Data, Surveillance, and the AI Arms Race

New algorithm digs up 18 Earth-like exoplanets from old Kepler data

So far almost 4,000 planets have been discovered orbiting stars other than the Sun, and that tally is constantly growing. Now another 18 exoplanets have been added to the haul, but the difference this time is that all of them are roughly Eart… Continue reading New algorithm digs up 18 Earth-like exoplanets from old Kepler data

Cryptanalyzing a Pair of Russian Encryption Algorithms

A pair of Russia-designed cryptographic algorithms — the Kuznyechik block cipher and the Streebog hash function — have the same flawed S-box that is almost certainly an intentional backdoor. It’s just not the kind of mistake you make by accident, not in 2014…. Continue reading Cryptanalyzing a Pair of Russian Encryption Algorithms

Software: It Is All In The Details

Who’s the better programmer? The guy that knows 10 different languages, or someone who knows just one? It depends. Programming is akin to math, or perhaps it is that we treat some topics differently than others which leads to misconceptions about what makes a good programmer, mathematician, or engineer. We submit that to be a great programmer is less about the languages you know and more about the algorithms and data structures you understand. If you know how to solve the problem, mapping it to a particular computer language should be almost an afterthought. While there are many places that …read more

Continue reading Software: It Is All In The Details

MD5 and SHA-1 Still Used in 2018

Last week, the Scientific Working Group on Digital Evidence published a draft document — "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital and Multimedia Forensics" — where it accepts the use of MD5 and SHA-1 in digital forensics applications: While SWGDE promotes the adoption of SHA2 and SHA3 by vendors and practitioners, the MD5 and… Continue reading MD5 and SHA-1 Still Used in 2018

Microsoft hopes crowdsourced A.I. algorithms will help avoid the next global cyberattack

If you’ve developed an artificial intelligence tool capable of predicting the next ransomware outbreak, Microsoft wants to hear about it. And they’re willing to pay. More than 300 data scientists, security practitioners and academics are involved in an initiative to help Microsoft determine which Windows machines are the most vulnerable to malicious software. The competition challenges participants to assess the probability a device will be hit with malware based on different factors about the machine, ranging from the firewall configuration to the antivirus software and CPU. Microsoft announced the competition on Dec. 13, giving participants three months to develop an algorithm that can predict whether a Windows 10 or Windows XP computer, for example, is likely to be infected with the next major virus, organizers said. The competition offers a glimpse at how cybersecurity will blend with artificial intelligence and machine learning, as major companies invest in experiments that could […]

The post Microsoft hopes crowdsourced A.I. algorithms will help avoid the next global cyberattack appeared first on CyberScoop.

Continue reading Microsoft hopes crowdsourced A.I. algorithms will help avoid the next global cyberattack

The Time for Passwords Came … and Went

After struggling with every combination of your name and your birth year for the perfect username, you’re probably used to this welcoming you on every website you join: Password must contain: One aquatic animal Your favorite color Three uppercase lett… Continue reading The Time for Passwords Came … and Went