Here we are again. Man versus machine. On one corner, we have the machine capable of reading huge amounts of data in so little time, and on the other, an employee who knows nothing but to do his or her job to the best of their effort.

 

But against malware, who will fare better?

 

What is malware?

 

Malware has made it to the new vocabulary of “enemy files.” They’re not exactly viruses in that they have no specific signature. Instead, they have their own instruction, their own code that may or may not be intrusive at all, and sometimes (in fact, most of the time) they are not in the computer at all.

 

What is machine learning?

 

Machine learning is simple: If the computer sees it do something wrong once, it will learn that it is bad from then on. Say, for example, if I were a computer virus and I do something bad, even though the machine-learning antivirus doesn’t recognize me yet, as soon as I do something bad, the antivirus changes its stance against me , and voila! The antivirus has learned. Machine learning is magnificent, and in every way, effective.

 

Then again, only to a certain point.

 

What is Employee Vigilance?

 

Now here comes the other end of the ring: the employee. This is why companies hire tech personnel, sometimes even blue-hat hackers themselves to prove the antivirus wrong. You see, the antivirus can only see files, and ONLY files. What if the enemy is not in a file, but is instead in a code? An example of this is a simple batch file that downloads a malicious code, which in itself is also not very bad. However, the download mechanism creates a cascade, causing a denial of service in the CPU of the computer, causing it to crash.

 

There, that is where the tech team and the blue-hats come in.

 

Since antiviruses cannot discern wrong from right straight away, they only see the inner workings of the file. They only see the “signature” of the file, which, in the case of a virus, the “signature” of being a virus, may it be a Trojan, a worm, or spyware.

 

An employee sees far more than that. The employee and the blue-hat hacker sees the commands themselves, and from there, moves forward to a new set of instructions, ultimately preventing an attack. In our example given, this would mean saving the computer from a total denial of service.

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
Transcend Wins Good Design Award 2017
Techworld Date Posted: 17 October 2017 3:05 PM | 339 Views
Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, today announced that its M.2 SSD Enclosure kit CM42 has won the "Good Design Award 2017" for top-quality, groundbreaking design. The Good.... See More
 
Transcend Wins Good Design Award 2017
Techworld Date Posted: 3:05 PM | 339 Views
Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, today announced that its M.2 SSD Enclosure kit CM42 has won the "Good Design Award 2017" for top-quality, groundbreaking design. The Good...See More

 
There’s still time! Avail the Best Gaming Notebook This Holiday Season
Techworld Date Posted: 16 December 2017 4:43 PM | 222 Views
Only few days left for you to take advantage of this Christmas treat. MSI got you covered with up to P15,000 cash discount plus premium items as freebies upon purchase on select models. . See More
 
There’s still time! Avail the Best Gaming Notebook This Holiday Season
Techworld Date Posted: 4:43 PM | 222 Views
Only few days left for you to take advantage of this Christmas treat. MSI got you covered with up to P15,000 cash discount plus premium items as freebies upon purchase on select models. See More

 
Nearly Half of Advanced Targeted Attacks in Q3, 2017 Came from Chinese-Speaking Actors
Techworld Date Posted: 23 November 2017 3:51 PM | 179 Views
The third quarter of 2017 clearly demonstrated that Chinese-speaking actors have not “disappeared” and are still very much active, conducting cyber-espionage campaigns against a wide range of countries and industry verticals. . See More
 
Nearly Half of Advanced Targeted Attacks in Q3, 2017 Came from Chinese-Speaking Actors
Techworld Date Posted: 3:51 PM | 179 Views
The third quarter of 2017 clearly demonstrated that Chinese-speaking actors have not “disappeared” and are still very much active, conducting cyber-espionage campaigns against a wide range of countries and industry verticals. See More

 
Digital Transformation (DX) Leads the Philippines Outsourcing Market to Hit US$500 Million by 2021
Techworld Date Posted: 24 August 2017 10:16 AM | 190 Views
The total outsourcing services spending in the Philippines is expected to exceed US$500 million by 2021, according to the latest forecast from theIDC APeJ Semiannual Services Tracker. Enterprises' Digital Transformation (DX) initiatives, as well.... See More
 
Digital Transformation (DX) Leads the Philippines Outsourcing Market to Hit US$500 Million by 2021
Techworld Date Posted: 10:16 AM | 190 Views
The total outsourcing services spending in the Philippines is expected to exceed US$500 million by 2021, according to the latest forecast from theIDC APeJ Semiannual Services Tracker. Enterprises' Digital Transformation (DX) initiatives, as well...See More

 
ADATA to Showcase Its Latest Innovations at IFA 2018
Techworld Date Posted: 23 August 2018 2:03 PM | 299 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND flash products, has announced that it will be showcasing its latest products and solutions at IFA 2018 in Berlin. Among the products to.... See More
 
ADATA to Showcase Its Latest Innovations at IFA 2018
Techworld Date Posted: 2:03 PM | 299 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND flash products, has announced that it will be showcasing its latest products and solutions at IFA 2018 in Berlin. Among the products to...See More

 
Geopolitical Targets and New Campaigns in Asia Mark Busy Q2 for Threat Actors
Techworld Date Posted: 30 August 2018 2:08 PM | 65 Views
During the second three months of 2018, Kaspersky Lab researchers observed an active landscape of APT operations, based mainly in Asia and involving both well-known and less familiar threat actors. . See More
 
Geopolitical Targets and New Campaigns in Asia Mark Busy Q2 for Threat Actors
Techworld Date Posted: 2:08 PM | 65 Views
During the second three months of 2018, Kaspersky Lab researchers observed an active landscape of APT operations, based mainly in Asia and involving both well-known and less familiar threat actors. See More

Rafael Aquino
Lisa Su and the AMD Army
Techworld • By: Rafael Aquino | Date Posted: 7 August 2017 2:53 PM | 249 Views
Lisa Su, in sum, is the current CEO and president of Advanced Micro Devices (AMD). Her leadership has led the company to great heights, and without her ability, AMD might not be where it.... See More
Rafael Aquino
Lisa Su and the AMD Army
Techworld • By: Rafael Aquino | Date Posted: 2:53 PM | 249 Views
Lisa Su, in sum, is the current CEO and president of Advanced Micro Devices (AMD). Her leadership has led the company to great heights, and without her ability, AMD might not be where it...See More

 
Transcend® Offers a New Perspective with the DrivePro Body 60 Body Camera
Techworld Date Posted: 5 June 2018 10:44 AM | 223 Views
Transcend® Information, Inc. (Transcend®), a leading manufacturer of storage and multimedia products, proudly introduces the DrivePro Body 60 body camera. This state-of-the-art POV tethered camera is designed specifically for military and public safety professionals.... See More
 
Transcend® Offers a New Perspective with the DrivePro Body 60 Body Camera
Techworld Date Posted: 10:44 AM | 223 Views
Transcend® Information, Inc. (Transcend®), a leading manufacturer of storage and multimedia products, proudly introduces the DrivePro Body 60 body camera. This state-of-the-art POV tethered camera is designed specifically for military and public safety professionals...See More

 
Phantom 4 Advanced vs Phantom 4 Pro: 4 Differences You Need to Know
Techworld Date Posted: 24 August 2017 9:41 AM | 177 Views
DJI's most recent release, the Phantom 4 Advanced, is a slightly altered version of the Phantom 4 Pro unit which came out late last year. Its titanium and magnesium alloy makes the aircraft more durable.... See More
 
Phantom 4 Advanced vs Phantom 4 Pro: 4 Differences You Need to Know
Techworld Date Posted: 9:41 AM | 177 Views
DJI's most recent release, the Phantom 4 Advanced, is a slightly altered version of the Phantom 4 Pro unit which came out late last year. Its titanium and magnesium alloy makes the aircraft more durable...See More

 
Globe Telecom Signs Multi-Year Intelligent Operations Deal with Amdocs for Continuous Enhancement of Services and Operations
Techworld Date Posted: 1 March 2018 2:38 PM | 360 Views
Amdocs, (NASDAQ: DOX), a leading provider of software and services to communications and media companies, today announced that it has signed a multi-year services contract with Globe Telecom, one of the Philippines’ largest telecommunications.... See More
 
Globe Telecom Signs Multi-Year Intelligent Operations Deal with Amdocs for Continuous Enhancement of Services and Operations
Techworld Date Posted: 2:38 PM | 360 Views
Amdocs, (NASDAQ: DOX), a leading provider of software and services to communications and media companies, today announced that it has signed a multi-year services contract with Globe Telecom, one of the Philippines’ largest telecommunications...See More


Power by

Download Free AZ | Free Wordpress Themes