Remove Mining Remove Paper Remove Retail Remove Video
article thumbnail

Attacks against machine learning — an overview

Elie

this paper. as highlighted in the video above. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. Finally, if you’d rather watch a talk instead, take a look at the video on. and the video on how.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

this paper. as highlighted in the video above. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. Finally, if you’d rather watch a talk instead, take a look at the video on. and the video on how.

Mining 91
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. It's important that people think this isn't mine. So here's the thing, SpyPhone is not an isolated incident. There are literally dozens of other examples.