With the mass proliferation and increased capability of mobile devices such as smartphones, tablets, netbooks and laptops, many organisations are looking at ways in which they can implement a Bring Your Own Device (BYOD) strategy.
In this article, Sophos describes the process they used to develop their models. To help explain the concepts, they worked through the development and evaluation of a toy model meant to solve the very real problem of detecting malicious URLs.
To date, our industry has mystified machine learning in secrecy and jargon. Transparency, explanation, and information is what is prefered. Please enjoy this guide – a collection of the articles we’ve shared throughout the year to tell the story.
Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix.