7,477 Results for:algorithms

  • Sort by: 

Block ciphers: REESSE3+ vs. International Data Encryption Algorithm

By Michael Cobb 15 Jul 2015

Expert Michael Cobb explains the difference between the REESSE3+ and IDEA block ciphers and explores when each is applicable in an enterprise setting. Read More

Computer scientists use algorithm to predict Bitcoin prices

By Clare McDonald 24 Oct 2014

An MIT professor and his student have written a paper describing the use of an algorithm to predict the price of Bitcoin Read More

CISSP training video: Cryptography algorithms and encryption keys

By Shon Harris 03 Oct 2014

In this CISSP Essentials Security School presentation, Shon Harris explains the basics of the Cryptography domain, including definitions, cryptography algorithms, encryption keys and more. Read More

Machine learning's training data is a security vulnerability

By Nicole Laskowski 31 Oct 2017

Microsoft's Danah Boyd has a sobering message for CIOs: The data used to train machine learning algorithms is at risk. Read More

Up to 270 women may have died due to breast cancer screening IT failure, says health secretary

By Lis Evenstad 02 May 2018

Computer algorithm failure caused 450,000 women to miss their breast cancer screenings – some of whom will have "had their lives shortened" by the error, Jeremy Hunt has admitted Read More

Improve your user engagement metrics with emotional analytics

By George Lawton 28 Aug 2017

Find out how new emotion analytics algorithms are bringing feeling, emotional connection, and engagement to modern apps. Read More

How machine learning is used to detect fraud

By Aaron Tan 27 Apr 2018

One of machine learning’s most well-known use cases is fraud detection, an area that has drawn the attention of a growing number of technology suppliers looking to develop the best algorithms and ... Read More

The suburban rogue trader's algorithms behind the 2010 US flash crash

By Karl Flinders 24 Apr 2015

US authorities accuse British trader Navinder Singh Sarao of manipulating the stock market with fraudulent trades, triggering the 2010 flash crash Read More

iXBRL inventor: my algorithm turns UK company data into 'useless PDFs'

By Mark Ballard 11 Aug 2015

The UK business registrar has been rendering its revolutionary company data useless with software written by the very man who invented the principle way to make it meaningful.It has taken Companies ... Read More

RSA-1024 keys: How does a Libgcrypt vulnerability expose them?

By Nick Lewis 31 Jan 2018

A Libgcrypt vulnerability could allow attackers to recover private RSA-1024 keys, as it allows a left-to-right sliding window that shows how specific parts of the algorithm work. Read More