A Review of the Best News of the Week on AI, IoT, & Mobile Security

Android Security 2017 Year in Review (Google Online Security Blog, Mar 15 2018)
Fourth annual Android Security Year in Review from Google

Taking down Gooligan: part 2 — inner workings (Elie Bursztein – Google, Mar 19 2018)
This posts provide an in-depth analysis of how the Gooligan malware inner-working.

Facebook Security Chief Said to Leave After Clashes Over Disinformation (The New York Times, Mar 19 2018)
Alex Stamos, the chief information security officer, will leave after disagreements over how Facebook should deal with its role in spreading disinformation, according to people briefed on the matter.


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


Uber’s Self-Driving Car Just Killed Somebody in Arizona. Now What? (Wired, Mar 19 2018)
The first deadly crash raises questions about how quickly autonomous driving technology is progressing—and who’s in charge of keeping everybody safe.

AI gave Stephen Hawking a voice—and he used it to warn us against AI (Quartz, Mar 20 2018)
He made no secret of his fears that thinking machines could one day take charge.

Why Artificial Intelligence is Important for Cyber-Security (eWEEK, Mar 14 2018)
“Cyber-security is about making intelligent decisions based on what is good and what is bad, based on the data that you have in front of you,” he said. “That’s a problem that is suited to machine learning techniques.”

Artificial Intelligence and the Attack/Defense Balance (Schneier on Security, Mar 15 2018)
Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things.

The Containerization of Artificial Intelligence (Dark Reading, Mar 16 2018)
AI automates repetitive tasks and alleviates mundane functions that often haunt decision makers. But it’s still not a sure substitute for security best practices.

Voice-Operated Devices, Enterprise Security & the ‘Big Truck’ Attack (Dark Reading, Mar 15 2018)
The problem with having smart speakers and digital assistants in the workplace is akin to having a secure computer inside your office while its wireless keyboard is left outside for everyone to use.

AI services market to reach $188 billion worldwide by 2025 (Help Net Security, Mar 19 2018)
Artificial intelligence (AI) has worked its way into a variety of industries, from the obvious (autonomous vehicles) to the hidden (anti-money laundering due diligence). But according to a new report from Tractica, while organizations are clearly recognizing the value associated with incorporating AI into their business processes, they are also encountering a number of challenges with integrating this new intelligence into operational processes.

Machine Learning: Practical Applications for Cybersecurity (Recorded Future, Mar 14 2018)
One of the biggest barriers to human intelligence is language. With modern natural language processing, machines can process text irrespective of language, including slang and industry jargon.

Mythic nets $40M to create a new breed of efficient AI-focused hardware (TechCrunch, Mar 20 2018)
Mythic particularly focuses on the inference side of AI operations — basically making the calculation on the spot for something based off an extensively trained model.

The US military wants AI to dream up weird new helicopters (MIT Technology Review, Mar 20 2018)
A DARPA project aims to see if machine learning can change the way complex engineering systems are designed.

Spot the Fake: Artificial Intelligence Can Produce Lifelike Photographs (Scientific American, Mar 20 2018)
By pitting AIs against one another, tech companies are creating realistic computer-generated images

Attackers turn to IoT and ICS to find gaps in security (Cisco Blog, Mar 16 2018)
Research from Cisco and partners reveal increased interest in IoT and ICS from security professionals and attackers alike Technology solutions and processes that rely on the Internet of Things…

Smartphones Will Get Even Smarter With On-Device Machine Learning (IEEE Spectrum, Mar 20 2018)
It’s time for deep learning algorithms to come down from the cloud and get into your gadgets

Tricks that cybercriminals use to hide in your phone (WeLiveSecurity, Mar 16 2018)
The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to confuse users; and second, sophisticated technical mechanisms that try to obstruct malware detection and analysis.

This Android malware redirects calls you make to your bank to go to scammers instead (Graham Cluley, Mar 19 2018)
Once installed the malware will intercept mobile calls you attempt to make to your bank, and instead direct them to a scammer.

GrayKey iPhone unlocker poses serious security concerns (Malwarebytes Labs, Mar 15 2018)
Two iPhones can be connected at one time, and are connected for about two minutes. After that, they are disconnected from the device, but are not yet cracked. Some time later, the phones will display a black screen with the passcode, among other information.

New Fakebank malware variant intercepts calls on Android smartphones (SC Magazine, Mar 19 2018)
Malware active in South Korea, redirects calls to scammers. Security researchers have discovered a new variant of the Fakebank malware.