A Review of the Best News of the Week on AI, IoT, & Mobile Security

Startup Working on Contentious Pentagon AI Project Was Hacked (Wired, Jun 18 2018)
Current and former employees say computers at Clarifai, which is analyzing drone images as part of Project Maven, were hacked last fall.

Tapplock Smart locks found to be physically and digitally vulnerable (SC Magazine, Jun 14 2018)
Tapplock Smart locks contain several physical and digital vulnerabilities, each of which could allow an attacker to crack the lock with some attacks taking as little as two seconds to execute.

World Cup 2018: How to Secure Your Devices When Traveling in Russia (Wired, Jun 14 2018)
Russia expects as many as 2 million visitors during the 2018 World Cup, most of whom should take extra precautions against the country’s many cyber risks.


Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report


In Trump Rebuke, US Senate Votes to Reimpose Ban on China’s ZTE (SecurityWeek, Jun 18 2018)
The US Senate defied President Donald Trump by voting Monday to overrule his administration’s deal with Chinese telecom firm ZTE and reimpose a ban on high-tech chip sales to the company.

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings (Infosec Island, Jun 13 2018)
To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Facebook Claims 99% of Extremist Content Removed Without Users’ Help (SecurityWeek, Jun 15 2018)
At this week’s International Homeland Security Forum (IHSF) hosted in Jerusalem by Israel’s minister of public security, Gilad Erdan, Facebook claimed growing success in its battle to remove extremist content from the network.

Reverse Engineering the Analyst: Building Machine Learning Models for the SOC (FireEye, Jun 05 2018)
While most analysts and SOCs are vigilant and responsive, the fact is they are often overwhelmed with alerts. If a SOC is unable to review all the alerts it generates, then sooner or later, something important will slip through the cracks.

The Journey to AI: Change Your Approach to Data (eWEEK, Jun 19 2018)
Does your best data resides behind the firewall, while the tools you need to conduct analytics are on the cloud? You need to connect the two to achieve common goals.

IT, OT and IoT: existential technology lifecycle management (CSO Online, Jun 06 2018)
If you give companies a way to make more money by making it clear that we only buy products that have been tested, approved and include security maintenance plans, those companies will rise to the occasion and work hard to get your business.

Next-Gen Cybersecurity for Trucking (Infosecurity Magazine, Jun 13 2018)
Students are working to develop solutions to secure transportation industry.

Google to Fix Location Data Leak in Google Home, Chromecast (Krebs on Security, Jun 18 2018)
Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network.

Apple Update Will Hamper Police Device Crackers (Infosecurity Magazine, Jun 14 2018)
Latest iOS patches will prevent access to phone via USB after one hour

Android Devices With Misconfigured ADB, a Ripe Target for Cryptojacking Malware (Threatpost, Jun 13 2018)
Vendors have been shipping Android products with Android Debug Bridge enabled, making them attractive targets for hackers.

Mobile App Threats Continue to Grow (Dark Reading, Jun 14 2018)
Criminals looking to profit from corporate resources and information keep going after mobile devices, two new reports confirm.

The challenges of securing mobile workers and keeping data secure (Help Net Security, Jun 15 2018)
In this podcast, Jon Fielding, Managing Director for Apricorn in EMEA, talks about the challenges related to securing mobile workers, and how they can be solved.

Cops Are Confident iPhone Hackers Have Found a Workaround to Apple’s New Security Feature (Motherboard, Jun 14 2018)
“Grayshift has gone to great lengths to future proof their technology and stated that they have already defeated this security feature in the beta build.”

Football app tracks illegal broadcasts using your microphone and GPS (Naked Security – Sophos, Jun 15 2018)
La Liga is asking users for their consent to turn on the new, eavesdroppy-feeling function, but many users aren’t exactly thrilled.

MysteryBot Android trojan aims at banking apps (SC Magazine, Jun 15 2018)
Security researchers have discovered a new type of malware that combines three-legged threat with a banking trojan, keylogger, and mobile ransomware in one package.

New Telegram-abusing Android RAT discovered in the wild (WeLiveSecurity, Jun 18 2018)
Entirely new malware family discovered by ESET researchers.