AI interview: Michael Osborne, professor of machine learning
The corporate domination of artificial intelligence (AI) is preventing the technology from reaching its full potential to benefit society, says AI expert Michael Osborne, who…
The corporate domination of artificial intelligence (AI) is preventing the technology from reaching its full potential to benefit society, says AI expert Michael Osborne, who…
ANZ Banking Group has expanded its ‘return to work’ program, which started as a way to fill vacant technology roles, to now include more traditional…
Microsoft is testing a new and modern-looking Windows 11 volume mixer accessible via the taskbar Quick Settings panel that helps adjust the volume on a…
Hollywood has colourful notions about artificial intelligence (AI). The popular image is a future where robot armies spontaneously turn to malevolence, pitching humanity in a…
Credit: Australian National Maritime Museum. A third-party IT contractor working at the Australian National Maritime Museum allegedly accessed its accounting system and “illegally changed bank…
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach corporate networks. Here’s how to…
By Ashley Burke, Information Security Program Manager I can’t believe it’s been two years already! I feel like I just entered the cybersecurity field yesterday!…
The security experts at Cado Labs have recently uncovered a new crypto jacking operation that specifically targets vulnerable Redis deployments. The key element of this…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google Cloud Platform allows data exfiltration without a (forensic) traceAttackers…
by Janelle Drolet Vice President, Business Development for Towerwall Cyber threats continue to evolve at a rapid pace, leading to an expanded attack surface populated…
Akamai Technologies reached a definitive agreement to acquire Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running stateful applications anywhere at scale.…
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access or overwrite sensitive data, such…