Sun.Jan 07, 2018

article thumbnail

How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once

WIRED Threat Level

The uncanny coincidences among the Meltdown and Spectre discoveries raise questions about "bug collisions"—and the safety of the NSA's hidden vulnerability collection.

Security 111
article thumbnail

Think you’re not susceptible to phishing? Think again

IT Governance

Phishing is big business for cyber criminals. According to PhishMe’s Enterprise Phishing Resiliency and Defense Report 2017 , phishing attacks rose by 65% last year, with the average attack costing mid-sized companies $1.6 million (about £1.2 million). This is despite many respondents claiming that they are no longer fooled by cyber criminals’ most common techniques to trick people into clicking malicious links and opening emails.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts Weigh In On Spectre Patch Challenges

Threatpost

Mitigating Spectre and Meltdown flaws won't be easy, but experts say exploits targeting Spectre will be hard to patch against.

Cloud 46
article thumbnail

2017 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Once again, it’s time for our annual review of eDiscovery case law! This is our seventh annual review of cases that we covered on the eDiscovery Daily blog over the past year. As always, we had a number of interesting cases related to various eDiscovery topics. So, as we have done for the last six(!) years, let’s take a look back at 2017! Last year, eDiscoveryDaily published 78 posts related to eDiscovery case decisions and activities over the past year, covering 62 unique cases !

Sales 44
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.