Aggregator
Computing at the Edge
4 years 6 months ago
Welcome to the Akamai October 2020 Update - a week of product updates, new features, and innovations. We'll be highlighting a different area of our portfolio each day this week. In today's post, we look at our enhanced edge computing capabilities and how they help developers more effectively and rapidly improve customer experiences on the Akamai platform.
Gregory Griffiths
Machine Learning Attack Series: Stealing a model file
4 years 6 months ago
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
Overview: How Husky AI was built, threat modeled and operationalized Attacks: The attacks I want to investigate, learn about, and try out We talked about creating adversarial examples and “backdoor images” for Husky AI before. One thing that we noticed was that an adversary with model access can very efficiently come up with adversarial examples.
某期间用到的溯源技巧
4 years 6 months ago
前几周用到的溯源技巧。
某期间用到的溯源技巧
4 years 6 months ago
前几周用到的溯源技巧。
基于对象存储隧道的远控工具开源啦
4 years 6 months ago
基于亚马逊S3\阿里云OSS\腾讯COS通信隧道的远程管理工具
基于对象存储隧道的远控工具开源啦
4 years 6 months ago
基于亚马逊S3\阿里云OSS\腾讯COS通信隧道的远程管理工具
Coming up: Grayhat Red Team Village talk about hacking a machine learning system
4 years 6 months ago
Excited to announce that I will be presenting at Grayhat - Red Team Village on October 31st 2020. The presentation is about my machine learning journey and how to build and break a machine learning system.
If you follow my blog, you can guess that there will be lots of discussion around “Husky AI”. The bits and pieces that make up a machine learning pipeline, and how to threat model such a system.
Proliferation of Mobile Devices: The Impact on Consumer Security
4 years 6 months ago
As the use of mobile devices continues to skyrocket worldwide, a new danger is silently emerging against consumers. This article delves into the deep end of how the proliferation of mobile devices is impacting consumer security
The post Proliferation of Mobile Devices: The Impact on Consumer Security appeared first on McAfee Blog.
McAfee
Success at New Zealand Rainbow Excellence Awards 2020
4 years 6 months ago
从安全切面到Security Mesh
4 years 6 months ago
理解切面防御的关键在于明白它不是安全防御的目标,而是建设的过程和手段。
Education's Digital Future and the End of Snow Days
4 years 6 months ago
Healthcare dramatically adjusted due to the COVID-19 pandemic. But parents around the world are much more concerned with education. F5 Labs' Preston Hogue writes for SecurityWeek, describing how the traditional classroom was turned on its head in a matter of weeks, and which of those changes will be...
聊聊微信读书
4 years 6 months ago
聊聊读书的需求,以及微信读书这个产品。
聊聊微信读书
4 years 6 months ago
聊聊读书的需求,以及微信读书这个产品。
聊聊微信读书
4 years 6 months ago
聊聊读书的需求,以及微信读书这个产品。
聊聊微信读书
4 years 6 months ago
聊聊读书的需求,以及微信读书这个产品。
WarezTheRemote: Turning Remotes into Listening Devices
4 years 6 months ago
Television remotes have gotten little attention as a potential attack vector ? despite being one of the most common household devices you can find.
JJ Lehmann
Death by a Thousand Cuts: Nuisance DDoS Attacks in the Games Industry
4 years 6 months ago
At Akamai, we talk a lot about DDoS attacks. It's because we're pretty good at handling them. We've stopped many of the world's biggest attacks. And, while less common, they get a lot of attention. But we can also stop the world's smallest attacks. And we stop lots of them. It's these smaller attacks that we're talking about today.
Jonathan Singer
How Cyber Attacks Changed During the Pandemic
4 years 6 months ago
Cybersecurity attacks surged during the pandemic, with large jumps in DDoS and password login attacks against online retailers and APIs.
Cybersecurity Awareness Month: If You Connect It, Protect It
4 years 6 months ago
Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S....
The post Cybersecurity Awareness Month: If You Connect It, Protect It appeared first on McAfee Blog.
McAfee