A group of researchers with CSIRO’s Data61, the digital innovation arm of Australia’s national science agency, have been working on a system for run time detection of trojan attacks on deep neural network models. Although it has yet to be tested in the text and voice domain, their system is highly effective when it comes to spotting trojan attacks on DNN-based computer vision applications. What are deep neural networks? Artificial neural networks (ANNs) are computational … More
The post Detecting Trojan attacks against deep neural networks appeared first on Help Net Security.
Account Takeover attacks don’t follow conventional attack patterns – they look, act, and feel like legitimate users. Without the right tooling, visibility into your environment, and intimate understanding of your users, defending against Account Takeover attacks (ATOs) can be extremely difficult. Worse yet, if done incorrectly, defending against ATOs can end up impacting legitimate users and traffic. There are ways to make defending these attacks much easier. This webinar (registration required) with guest Kevin Hanaford, … More
The number of IT security incidents reported by critical infrastructure companies in Germany has soared. In 2017, the German Federal Office for Security in Information Technology (BSI) received 145 such reports from critical infrastructure providers. In the second half of 2018 alone that number reached 157, Welt am Sonntag reports. Reporting requirements The BSI is the federal agency charged with managing computer and communication security for the German government, as well as monitoring the security … More
The post IT security incidents affecting German critical infrastructure are on the rise appeared first on Help Net Security.
With RSA Conference 2019 USA just two weeks away, we asked Sandra Toms, Vice President and Curator, RSA Conference, to tell us more about the challenges involved in developing a broad educational resource for information security professionals the event is known for. Read the Q&A to discover how the conference brings security professionals together, what you can expect at this year’s event, and what RSA Conference plans for the future. The information security industry has … More
The post How RSA Conference 2019 brings diverse security professionals together appeared first on Help Net Security.
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and food delivery sector. Why do all these new companies use the cloud and what advantages does it give them? Unlike legacy competitors, innovators with new infrastructure can: 1. Quickly scale and grow their customer base. 2. Support their business in different geographies and ensure availability. 3. Ensure convenience (users are accessing … More
The post Building security into cloud native apps with NGINX appeared first on Help Net Security.
The recovered compromised credentials and personally identifiable information (PII) as well as the identified trends in online security habits and the data criminals tend to steal and use, have been released in the 2018 Credential Exposure Report by SpyCloud. SpyCloud’s research team recovered 3,457,017,136 exposed sets of online account credentials and PII from 2,882 different sources, many of which were high-profile data breaches that led to credentials going up for sale on dark web forums … More