Antivirus

From the AI arms race to adversarial AI

The AI arms race is on, and it’s a cat and mouse game we see every day in our threat intelligence work. As new technology evolves, our lives become more convenient, but cybercriminals see new opportunities to attack users. Whether it’s trying to circumvent antivirus software, or trying to install malware or ransomware on a…

The AI arms race is on, and it’s a cat and mouse game we see every day in our threat intelligence work. As new technology evolves, our lives become more convenient, but cybercriminals see new opportunities to attack users. Whether it’s trying to circumvent antivirus software, or trying to install malware or ransomware on a user’s machine, to abusing hacked devices to create a botnet or taking down websites and important server infrastructures, getting ahead of the bad guys is the priority for security providers. AI has increased the sophistication of attacks, making it increasingly unpredictable and difficult to mitigate against. 

About the author

Michal Pěchouček, CTO, Avast.

Increased Systematic Attacks

AI has reduced the manpower needed to carry out a cyber-attack. As opposed to manually developing malware code, this process has become automated, reducing the time, effort and expense that goes into these attacks. The result: attacks become increasingly systema

Read More

Be the first to write a comment.

Leave a Reply

Antivirus

Disaster recovery, backup and security in 2020

2019 was a challenging year for organisations trying to reduce the likelihood and minimise the impact of IT outages. As we have seen, both businesses and public sector bodies are increasingly being targeted by opportunistic cybercriminals looking for vulnerabilities to exploit. The effects of these attacks have been devastating for some organisations. Unfortunately, despite improvements…

2019 was a challenging year for organisations trying to reduce the likelihood and minimise the impact of IT outages. As we have seen, both businesses and public sector bodies are increasingly being targeted by opportunistic cybercriminals looking for vulnerabilities to exploit. The effects of these attacks have been devastating for some organisations. Unfortunately, despite improvements in resilience, we expect these incidents to continue in 2020.

About the author

Peter Groucutt is the managing director or Databarracks.

The cyber crystal ball

When looking to the future, we inevitably tend to pay the most attention to big, shock predictions and neglect current trends. In fact, the risks we’ll face in 2020 are most likely to be the ones we already know about. Amara’s Law states that society tends to overestimate the effect of a technology in the short term and underestimate its effect in the long term. We will likely see a continuation of the same types of breaches and cyber-attacks we have seen in 2019. 

Will we see cyber criminals using quantum computers to break encryption and bypass antivirus solutions? Probably not. How about a rogue Artificial Intelligence (AI) systematically breaking into corporate networks and holding systems to ransom

Read More

Continue Reading
Antivirus

Mac malware threats are increasing according to Malwarebytes – but don’t panic just yet

Malwarebytes labs, the security researchers behind the popular Malwarebytes antivirus software, has released a new report that claims that Mac threat detection has risen in 2019.In the report, Malwarebytes looked at the top threat detections across Windows, Macs and Android devices. It found that of the top 25 detections, six of them were found on…

Malwarebytes labs, the security researchers behind the popular Malwarebytes antivirus software, has released a new report that claims that Mac threat detection has risen in 2019.

In the report, Malwarebytes looked at the top threat detections across Windows, Macs and Android devices. It found that of the top 25 detections, six of them were found on Macs. This means six of the threats that were found on the most devices were Mac threats.

  • The best Macs to buy right now
  • The best antivirus software
  • Here’s the best free malware removal software

Most alarmingly, 16% of total detections found by Malwarebytes were Mac malware threats. What makes this number particularly troubling is the relatively low Mac user base compared to Windows and Android.

As Thomas Reed, Malwarebytes’ director of Mac and mobile, explains, “Perhaps 16% doesn’t sound impressive, but when you consider the number of devices on which these threats were detected, the results become extremely interesting.”

Reed reveals that Malwarebytes’ userbase on Mac is around 1/12 of its Windows user base.

Malwarebytes provided a chart showing detections per device

Malwarebytes provided a chart showing detections per device (Image credit: Malwarebytes)

More detections per Mac

Another worrying detail to emerge fro

Read More

Continue Reading
Antivirus

Digital identity: enabling the new economy

As our lives become increasingly dependent on the internet, establishing trust becomes vital to society. Yet, the old ways of documenting and verifying trust are no longer fit for purpose: documents get faked; static data gets hacked; and consumers continue to opt for convenience over security. Hackers and malware remain ever present threats and consumers…

As our lives become increasingly dependent on the internet, establishing trust becomes vital to society. Yet, the old ways of documenting and verifying trust are no longer fit for purpose: documents get faked; static data gets hacked; and consumers continue to opt for convenience over security. Hackers and malware remain ever present threats and consumers still need to use antivirus software.

Close your eyes, and picture Britain in 1939. Bracing for a Second World War, the country introduces military conscription and the National Registration Bill, requiring every citizen to carry a national identity card at all times. One single document – one piece of information – to verify that you are who you say you are. 

About the author

Gus Tomlinson is Group Head of Strategy for GBG.

Fast forward 80 years, past multiple technological breakthroughs: the industrialisation of fossil fuels; commercial aviation; smart grids and electricity storage; global telecommunications; and of course, the internet. The march of technology never stops, and we’re now propelling ourselves towards post-digital life, living in smart cities and connected homes; working in the automated age; moving and spending across borders. 

These global shifts have already radically re-shaped the way we live. Yet, the ways we establish trust and verify identity remain stuck in the pa

Read More

Continue Reading
Antivirus

Intel Rapid Storage app bug lets malware evade AV

SafeBreach labs has discovered a vulnerability in Intel Rapid Storage Technology (Intel RST) that could allow malicious programs to bypass antivirus software.Researchers from the firm discovered that in older versions of the software, the IAStorDataMGRSvc.exe executable will try to load four DLLs (Dynamic-link libraries) from the Intel Rapid Storage Technology folder on a user’s C…

SafeBreach labs has discovered a vulnerability in Intel Rapid Storage Technology (Intel RST) that could allow malicious programs to bypass antivirus software.

Researchers from the firm discovered that in older versions of the software, the IAStorDataMGRSvc.exe executable will try to load four DLLs (Dynamic-link libraries) from the Intel Rapid Storage Technology folder on a user’s C drive.

Israeli chipmaker Habana Labs for $2bn

  • Windows malware turns PCs into zombie
  • Read More

    Continue Reading