AI, IoT, & Mobile Security – The Week’s Best News – 2018.01.02

A Review of the Best News of the Week on AI, IoT, & Mobile Security

Huawei Router Exploit Code Used in IoT Botnet Goes Public (eWEEK, Dec 29 2017)
At the core of the Satori Internet of Things (IoT) botnet that was disrupted by internet service providers (ISPs) earlier this month, is a vulnerability in Huawei routers. Researchers at NewSky Security reported Dec. 28. that code that exploits the Huawei vulnerability has now been publicly posted on the internet.

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet (Wired, Dec 27 2017)
If you own one of a few models of internet-connected speaker and you’ve been careless with your network settings, you might be one of thousands of people whose Sonos or Bose devices have been left wide open to audio hijacking by hackers around the world.

Edward Snowden’s new app turns any Android phone into a surveillance system (TechCrunch, Dec 27 2017)
NSA Whistleblower Edward Snowden is among the backers of a new surveillance app that helps guard against computer hijackings. Haven is an open source app that will run on any Android phone, particularly inexpensive and older devices. It operates like a surveillance system, using the device’s camera, audio recording capability and even accelerometer to detect movement and notify a user.


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


Researchers: Artificial Intelligence is dumber than a 5-year-old and no smarter than a rat (Tech Startups, Dec 27 2017)
In terms of human-level performance, the AI Index suggests that in some ways AI has already arrived. This is true in game-playing applications including chess, the Jeopardy! game show and, most recently, the game of Go. Nonetheless, the authors note that computers continue to lag considerably in the ability to generalize specific information into deeper meaning.

Can IoT help make the enterprise more secure? (Network World Security, Dec 27 2017)
Most people think of IoT as a security vulnerability, but Enterprise IoT could also be a security tool — and maybe a privacy issue.

Predictions 2018: Internet of Things Will Expand as Threat Vector (eWEEK, Jan 02 2018)
Millions of unsecure, Internet-enabled devices provide new threat surfaces that security operations experts will have to defend.

6 AI Cybersecurity Startups to Watch in 2018 – Nanalyze (Nanalyze, Jan 02 2018)
More and more cybersecurity startups are turning to artificial intelligence to fend off attacks, a trend we’ve covered throughout the year, including special features on predictive analytics, mobile security and secure communications.

The Need for Better Built-in Security in IoT Devices (Trend Micro, Dec 27 2017)
Trend Micro tested the built-in security of a particular IoT device type — internet-connected speakers.

AI-powered automated cybersecurity: Pros and cons (TechGenix, Dec 29 2017)
Cybercriminals are stalking your business. Can leveraging artificial intelligence to power automated cybersecurity keep you safe?

Android patches Janus Android App Signature Bypass that allowed Attackers to Modify Legitimate Apps (Trend Micro, Dec 27 2017)
Android’s regular security update for December 2017 included a fix for a serious vulnerability that could allow attackers to modify installed apps without affecting their signature.

Your smartphone can be easily hacked using its own sensors! (NewsBytes, Jan 02 2018)
Most smartphone owners use PIN codes to secure their devices. But scientists have now found that a phone’s own sensors can give away passwords/PINs to hackers, enabling them to unlock it.

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn