Hackers get around AI with flooding, poisoning and social engineering

Email not displaying correctly? View it in your browser.

CIO

CIO Newswatch

Dec 16, 2016
Featured Image

BlackBerry hands its brand to TCL, maker of its last smartphones

A week after BlackBerry officially pulled out of the smartphone market, it has agreed to license its brand to handset manufacturer TCL. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hackers get around AI with flooding, poisoning and social engineering
Be on high alert for this holiday spam
Non-malware attacks are on the rise
Hacker allegedly stole logins from a US election agency
Oracle CEO Safra Catz joins Trump's transition team
Forget Angular 3, Google jumps straight to Angular 4
Google age-discrimination trial date is two years away
How to replace a lost AirPods earphone or charging case
Feds want cars to talk to each other to avoid crashes
5 things you should do following the Yahoo breach
Feds frustrated by constantly crashing apps
Ransomware fighting coalition adds new members and decryption tools
NASA installs VPN to protect Deep Space Network
The top 10 PC technologies and trends to watch in 2017

White Paper: Rogue Wave Software

Maximize Performance and Mitigate Risks with PHP 7: CIO White Paper

PHP has proven to be the platform of choice for business-critical applications. With roots as a community-driven web-scripting language with little enterprise backing, PHP evolved rapidly into a driver of web and mobile growth. PHP grew fast because it embodied two core tenets: Stay simple and be easy to adopt. Read More

Thumbnail Image

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them Read More

Thumbnail Image

Be on high alert for this holiday spam

Scam artists don't care if this is the time for giving. They see the holidays as an opportunity to find a poor soul to fool. Here are some examples found thus far. Read More

Thumbnail Image

Non-malware attacks are on the rise

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Read More

Thumbnail Image

Hacker allegedly stole logins from a US election agency

A Russian-speaking hacker has been found selling stolen login credentials for a U.S. agency that tests and certifies voting equipment, according to a security firm. Read More

Thumbnail Image

Oracle CEO Safra Catz joins Trump's transition team

Oracle CEO Safra Catz is joining president-elect Donald Trump's transition team, it said Thursday. Read More

Thumbnail Image

Forget Angular 3, Google jumps straight to Angular 4

Company will skip over number 3 in versioning its JavaScript framework Read More

Thumbnail Image

Google age-discrimination trial date is two years away

In the meantime, the two sides are arguing over the language for the opt-in notice to notify other people who are eligible to join the lawsuit. Read More

Thumbnail Image

How to replace a lost AirPods earphone or charging case

If you lose one of your AirPods or the charging case, you don’t have to buy a new set. Read More

Thumbnail Image

Feds want cars to talk to each other to avoid crashes

The Department of Transportation has proposed a rule that would require vehicle-to-vehicle communication tech on all new light-duty vehicles, enabling a multitude of new crash-avoidance apps. Read More

Thumbnail Image

5 things you should do following the Yahoo breach

Following a massive data breach that affected over one billion Yahoo accounts, users should review the settings of their accounts, clean their mailboxes and turn on additional account security features. Read More

Thumbnail Image

Feds frustrated by constantly crashing apps

New report from Riverbed Technology identifies pervasive headaches stemming from unreliable applications in the federal government. Read More

Thumbnail Image

Ransomware fighting coalition adds new members and decryption tools

The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants. Read More

Thumbnail Image

NASA installs VPN to protect Deep Space Network

The VPN allows data to be transferred three times faster than before and supports near real-time communications, while also securing the data. Read More

Thumbnail Image

The top 10 PC technologies and trends to watch in 2017

In an era of sexy gadgets, its easy to knock PCs of being dinosaurs from a bygone era. But For every blue screen of death, there are many technological enhancements driving PCs into the era of virtual reality, 4K video and 5G connectivity. Read More

Webcast: Rogue Wave Software

Building the perfect PHP app for the enterprise: Keeping up with PHP: CIO Webcast

This introductory session lays the foundation for your PHP app and this series. If you have at least one year of PHP experience, this webinar explains these key building blocks for creating and maintaining enterprise-class applications, mobile services, and third-party libraries. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.