AI Powered Malware: The New Frontier for Cybersecurity

Byte Magazine, vol. 6, no. 7.

The scale of attack

Byte Magazine, vol. 8, no. 6.

Gaining access and evading detection

Data theft; maximum damage

Byte Magazine, vol. 7, no. 4.
Byte Magazine, vol. 3, no. 11.

Repurpose code — or sell it on the black market

Solutions

“The idea of ensemble learning is to build a prediction model by combining the strengths of a collection of simpler base models.” — Trevor Hastie, Robert Tibshirani, Jerome Friedman via Microsoft

Byte Magazine, vol. 4, no. 2.

You-anne. Legal researcher, tinkerer, writer. Thinking lots these days about vulnerabilities in sociotechnical systems 🤖 ✨

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Tenant Restrictions in Azure AD

Here’s to 50 days @Appsecco

PCI Compliance in Cloud Companies

Stock Firmware on Samsung GALAXY Fame Lite GT-S6790L

Flash Stock Rom on Samsung Galaxy

{UPDATE} Bridal Shop Hack Free Resources Generator

WannaCry : I want to Cry

THE JELLY BEAN AND MARSHMALLOW POOLS!

ESP RainMaker

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Yuan Stevens

Yuan Stevens

You-anne. Legal researcher, tinkerer, writer. Thinking lots these days about vulnerabilities in sociotechnical systems 🤖 ✨

More from Medium

Podcast with Doug Finke, Publisher and Managing Editor, Quantum Computing Report

The Case for an Annual “Quantum Games” Competition

DQC Case study: Using quantum computing to test cantilever’s deformation & structural integrity.

Cyber Warfare: The Narrative in the Network