GigaomHow PayPal uses deep learning and detective work to fight fraud
Hui Wang has seen the nature of online fraud change a lot in the 11 years she’s been at PayPal. In fact, a continuous evolution of methods is kind of the nature of… Read more »
{"source":"http:\/\/search.gigaom.com\/technology\/cybersecurity\/wijax\/383af13036138b805db0da550b1f5914?company=facebook","varname":"wijax_3df9090e85d48a387c9629f98fdfa6e8","title_element":"h2","title_class":"widget-title","title_before":"%3Ch2%20class%3D%22widget-title%22%3E","title_after":"%3C%2Fh2%3E"}
Alerts notify you of new stories or reports as soon as they are published. They are delivered via email and can be customized by topic and frequency.
Keep an eye on the future, by getting new results in your inbox.
Use the filters below to edit your Alert.
Hui Wang has seen the nature of online fraud change a lot in the 11 years she’s been at PayPal. In fact, a continuous evolution of methods is kind of the nature of… Read more »
It’s clear that big banks provide a lot of incentive for hackers to launch cyber attacks, given the amount of sensitive data they hold and the cash they oversee. But banks aren’t… Read more »
It might be a bit more difficult for hackers to launch coordinated attacks against several different companies at the same time thanks to a new collaborative threat-detection framework by Facebook called… Read more »
The password manager Dashlane, which competes with the likes of LastPass and 1Password, just gained a new trick. Through the acquisition of a New York-based startup called PassOmatic, Dashlane is now… Read more »
For enterprise-IT practitioners and data-center operators, SDN delivers networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. Read more »
Facebook detailed on Tuesday a new cybersecurity framework called ThreatData. It’s a collection of systems for ingesting, analyzing and acting upon threat data that can vary greatly in both type and… Read more »
Identity management solutions need to be able to be adaptive to change, and those responsible for them must consider cloud, mobile, social networks, and other complications during deployment. Read more »
The operational cost of normalizing and mining human-generated data is significant and requires a sound strategic understanding of technologies and business goals. Read more »
Some of your most private and important information could be on the black market for less than a tank of gas. Read more »
Critics say that a bill called CISPA, which has been passed by the House of Representatives and is on its way to the Senate, is just as bad as SOPA –… Read more »