“Though the methods above are tricky for a hacker to complete, artificial intelligence could end up making the process of stealing your identity much easier. Researchers at New York University have created a tool that can generate fake fingerprints to unlock mobile devices. Even more so, researchers have demonstrated how deep artificial neural networks can…
Tag: security
AI acceptance and the man on the Clapham omnibus
“The issues of ethics in AI revolve around four key tenets: security, transparency, fairness and liability. Each of these concerns, when addressed, promote trust in the application of artificial intelligence. In other words, the trust generated by ethical use can be viewed as a driving factor to AI acceptance by consumers. Security The Facebook Cambridge…
From virtual assistants to anti-money laundering tech, AI is transforming banking
“PelicanSecure brings together tools that use natural language processing and machine learning to analyse patterns of behaviour to flag up “subtle anomalies” pointing to instances of fraud. Factors like user location, spending patterns and unusual device configuration are all integrated into Pelican’s detection system. Describing the role AI has to play in turning the tide…
How AI can prevent a Marriott situation from happening again
Image Credit: Geralt / Pixabay “It is critical that organisations charged with protecting customer data take better steps to ensure that any cyber-attacks are quickly identified and stopped before damage is done. They should look towards smarter systems that utilise artificial intelligence to effectively and accurately identify genuine cyber threats in real time. It would…
AI may soon defeat biometric security
“One of the most challenging AI technologies for security teams is a very new class of algorithms called generative adversarial networks (GANs). In a nutshell, GANs can imitate or simulate any distribution of data, including biometric data. To oversimplify how GANs work, they involve pitting one neural network against a second neural network in a…
