AI, IoT, & Mobile Security – The Week’s Best News – 2018.02.06

A Review of the Best News of the Week on AI, IoT, & Mobile Security

How Google fought bad apps and malicious developers in 2017 (Android Dev. Blog, Feb 06 2018)
“In 2017, we took down more than 700,000 apps that violated the Google Play policies, 70% more than the apps taken down in 2016. This resulted in taking down of 100,000 bad developers in 2017, and made it more difficult for bad actors to create new accounts and attempt to publish yet another set of bad apps.”

New Monero Crypto Mining Botnet Leverages Android Debugging Tool (Threatpost, Feb 05 2018)
Dubbed ADB.Miner by 360 Netlab, the botnet is gaining entry to Android devices–mostly smartphones and TV boxes–through port 5555, which is associated with Android Debug Bridge, a command-line tool that is used for debugging, installing apps and other purposes.

PwC’s Global Artificial Intelligence Study: Sizing the prize (PwC, Feb 06 2018)
45% of total economic gains by 2030 will come from product enhancements, stimulating consumer demand. This is because AI will drive greater product variety, with increased personalisation, attractiveness and affordability over time.


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


Artificial Intelligence: The Complete Guide (Wired, Feb 01 2018)
Supersmart algorithms won’t take all the jobs, But they are learning faster than ever, doing everything from medical diagnostics to serving up ads.

Artificial intelligence and cybersecurity: The real deal (CSO Online, Jan 25 2018)
AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.

How Amazon Rebuilt Itself Around Artificial Intelligence (Wired, Feb 01 2018)
How deep learning came to power Alexa, Amazon Web Services, and nearly every other division of the company.

5 Questions to Ask about Machine Learning (Dark Reading, Jan 31 2018)
Marketing hyperbole often exceeds reality. Here are questions you should ask before buying.

The Limits of Artificial Intelligence and Deep Learning (Wired, Feb 02 2018)
Wired’s new columnist Jason Pontin on the limits of modern artificial intelligence.

IoT Botnets by the Numbers (Dark Reading, Jan 31 2018)
IoT devices are a botherder’s dream attack-vector.

New Botnet Is Recruiting IoT Devices (SecurityWeek, Feb 02 2018)
A new botnet is recruiting Internet of Things (IoT) devices by exploiting two vulnerabilities already popular among IoT botnets, Radware has discovered.

The future of smartphone security: Hardware isolation (Help Net Security, Feb 02 2018)
By combining software encryption with a hardware-isolated containers – such as a Linux computer on a microSD chip – Android devices can secure important data without necessarily undergoing the hassle of using a hardened phone or a proprietary ecosystem.

3 Ways Hackers Steal Your Company’s Mobile Data (Dark Reading, Feb 02 2018)
The most effective data exfiltration prevention strategies are those that are as rigorous in vetting traffic entering the network as they are traffic leaving it.

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn