In the last months, technologies and fields such as Artificial Intelligence (commonly known as AI), Big Data or Machine Learning have become the hottest notions of 2017, being introduced in every industry, and cybersecurity isn’t an exception.

But first, let’s focus on what is AI exactly. Artificial Intelligence, as its…

Every day, millions of devices are infected with a fairly strange trouble, joining the big family of botnets, without its victims suspecting it. Undeniably being one of the most common and numerous computer threats, botnets — and their dangers — remain surprisingly unknown to businesses and the general public.

Mostly…

Our choice to take a look back at this “basic” cybersecurity rule is not trivial: it is one of the basis of the Internet’s good practices and the beginning of an effective IT security strategy.

It’s a fact, passwords are ubiquitous in today’s society and our everyday lives. Let’s try…

After ransomware attacks and other phishing campaigns that have made the news recently, a new cyber threat is emerging today: cryptostealers. This term might not tell you anything at first, though it is related to THE technology of the moment: crypto-currencies. Bitcoin or Ethereum, these immaterial currencies are today developing…

Numerous scandals related to data breaches have made the news in the past months: for instance, the Equifax case, one of the most significant data-breach-case of 2017, touched millions of victims and has enormous repercussions (some are yet to be discovered today), or the recent case touching the famous Forever…

Reveelium

A new behavior analysis solution, Reveelium is capable to detect #viruses, #malware, #APT and unknown attacks... #machinelearning #predictiveanalytics

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store