{"id":202521,"date":"2017-06-30T00:17:43","date_gmt":"2017-06-30T04:17:43","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-artificial-intelligence-is-taking-on-ransomware-cnbc-com-cnbc\/"},"modified":"2017-06-30T00:17:43","modified_gmt":"2017-06-30T04:17:43","slug":"how-artificial-intelligence-is-taking-on-ransomware-cnbc-com-cnbc","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/how-artificial-intelligence-is-taking-on-ransomware-cnbc-com-cnbc\/","title":{"rendered":"How artificial intelligence is taking on ransomware &#8211; CNBC.com &#8211; CNBC"},"content":{"rendered":"<p><p>    In the early days, identifying malicious programs such as    viruses involved matching their code against a database of    known malware. But this technique was only as good as the    database; new malware variants could easily slip through.  <\/p>\n<p>    So security companies started characterizing malware by its    behavior. In the case of ransomware, software could look for    repeated attempts to lock files by encrypting them. But that    can flag ordinary computer behavior such as file compression.  <\/p>\n<p>    Newer techniques involve looking for combinations of behaviors.    For instance, a program that starts encrypting files without    showing a progress bar on the screen could be flagged for    surreptitious activity, said Fabian Wosar, chief technology    officer at the New Zealand security    company Emsisoft. But that also risks identifying harmful    software too late, after some files have already been locked    up.  <\/p>\n<p>    An even better approach identifies malware using observable    characteristics usually associated with malicious intent  for    instance, by quarantining a program disguised with a PDF icon    to hide its true nature.  <\/p>\n<p>    This sort of malware profiling wouldn't rely on exact code    matches, so it couldn't be easily evaded. And such checks could    be made well before potentially dangerous programs start    running.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.cnbc.com\/2017\/06\/29\/how-artificial-intelligence-is-taking-on-ransomware.html\" title=\"How artificial intelligence is taking on ransomware - CNBC.com - CNBC\">How artificial intelligence is taking on ransomware - CNBC.com - CNBC<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In the early days, identifying malicious programs such as viruses involved matching their code against a database of known malware. But this technique was only as good as the database; new malware variants could easily slip through <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/how-artificial-intelligence-is-taking-on-ransomware-cnbc-com-cnbc\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187742],"tags":[],"class_list":["post-202521","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202521"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=202521"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202521\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=202521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=202521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=202521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}