AI, IoT, & Mobile Security – The Week’s Best News – 2017.10.24

A Review of the Best News of the Week on AI, IoT, & Mobile Security

Reaper: Calm Before the IoT Security Storm? (Krebs on Security, Oct 23 2017)
Experts are sounding the alarm about the emergence of what appears to be a far more powerful strain of IoT attack malware — variously named “Reaper” and “IoTroop” — that spreads via security holes in IoT software and hardware. And there are indications that over a million organizations may be affected already.

Introducing the Google Play Security Reward Program (Google Online Security Blog, Oct 19 2017)
Google announces the Google Play Security Reward Program to incentivize security research into popular Android apps available on Google Play. Through collaboration with independent bug bounty platform, HackerOne, they’ll enable security researchers to submit an eligible vulnerability to participating developers, who are listed in the program rules.

IoT Cybersecurity: What’s Plan B? (Schneier on Security, Oct 18 2017)
In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn’t regulate the IoT market. It doesn’t single out any industries for particular attention, or force any companies to do anything. It doesn’t even modify the liability laws for embedded software. Companies can continue to sell IoT devices with whatever lousy security they want. What the bill does do is leverage the government’s buying power to nudge the market: any IoT product that the government buys must meet minimum security standards.


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


Mind-reading’ brain-decoding tech (ScienceDaily, Oct 23 2017)
Researchers have demonstrated how to decode what the human brain is seeing by using artificial intelligence to interpret MRI scans from people watching videos, representing a sort of mind-reading technology.

Machine Learning Is Working for CIOs, Vendor Survey Finds (Blogs – DevOps.com, Oct 17 2017)
Nearly 90 percent of CIOs are at least dabbling with machine learning, with 53 percent calling it an area of strategic focus for their companies. What’s more, almost 70 percent of the CIOs surveyed say decisions made by machines will soon be more accurate than those made by humans.

The​ ​10 ​Most​ ​Common​ ​Questions​ ​We​ ​Hear​ ​About​ ​Choosing​ ​an​ ​Enterprise​ ​Mobility​ ​Management​ ​Provider (Okta blogs, Oct 18 2017)
More than 80% of users are accessing their enterprise apps from mobile devices. Meanwhile, 56% of apps on these devices are for personal use. Clearly, employees are using their own devices for both work and play, and are unlikely to adopt company-provided devices anytime soon.

IoT Deployment Security Top Concern for Enterprises (Dark Reading, Oct 19 2017)
A new survey shows that 63% of respondents are worried about the impact of the Internet of Things on corporate security technologies and processes.

Europol calls for cooperation on Darkweb and IOT use by criminals (SC Magazine, Oct 23 2017)
In recent conferences Europol has been teaming up with other organisations to ensure a joint law enforcement approach with Interpol to the darkweb and ransomware especially, and with ENISA to meet the challenge of IOT.

Internet of Things in Healthcare – Three Examples of How IoT is Ushering in Advanced Healthcare (Cloudera VISION, Oct 18 2017)
What they’ve found is that by intelligently deploying IoT solutions, they’re able to drive operational efficiencies, introduce new products and services, improve the customer experience and create wholly new business models.

First, Do No Harm. Securing Healthcare IoT Devices (Check Point Blog, Oct 03 2017)
“When a hacker takes control of all networked medical devices at a hospital in Dallas and threatens to kill one patient every hour if his demands are not met, the Cyber team must find the source and figure out how they accessed an airtight security system.”

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn