A Review of the Best News of the Week on AI, IoT, & Mobile Security
China Dragonfly Eye AI can identify 2 BILLION people in seconds (Dailystar, Dec 12 2017)
Yitu Technology has made an AI algorithm that can connect to millions of surveillance cameras and instantly recognise people. The company – based in Shanghai, China – developed Dragonfly Eye to scan through millions of photographs that have been logged in the country’s national database.
Inside Mirai the infamous IoT Botnet: A Retrospective Analysis (Elie on Internet Security and Performance, Dec 03 2017)
This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices.
10 Mobile Security Threats (and What You Can do to Fight Back) (Auth0 Blog, Dec 04 2017)
The increased use of mobile devices has led to an uptick in mobile security threats. Now, enterprises have to be more diligent than ever to protect their private data.
An Artificial Intelligence Primer (Daniel Miessler, Dec 11 2017)
If you’re in tech, you hear these terms all the time and probably wonder what the differences are. They can get a bit confusing…
Alphabet’s Latest AI Show Pony Has More Than One Trick (Wired, Dec 06 2017)
AlphaZero can teach itself to be the world’s best at chess, Go, or Shogi in eight hours or less.
Forrester Data Infographic: Who’s Driving AI Adoption In The Enterprise? (Forrester, Dec 06 2017)
“We found that business technology decision makers (TDMs), i.e., those technologists aligned with a business unit, are the ones driving AI adoption within their firms, more so than traditional technology decision makers who are aligned with the tech organization.”
Google Is Giving Away AI That Can Build Your Genome Sequence (Wired, Dec 08 2017)
The deep learning tool can assemble a full genome from raw DNA more accurately than every existing method.
Artificial Intelligence Seeks An Ethical Conscience (Wired, Dec 07 2017)
Some AI researchers are concerned by the field’s power, and its ability to cause harm.
Fighting Automation with Automation (SecurityWeek, Dec 08 2017)
One of the biggest challenges will be the last mile of security – finding the will and the way to automate critical security hygiene functions, such as inventory management, patch and replace, hardening systems, and implementing two-factor authentication. The challenge is that complex, multi-cloud ecosystems and hyperconverged networks that span physical and virtual environments are making performing these basic security practices extremely difficult to achieve. It is essential, therefore, that AI and automation…
Friend or Foe? Machine Learning and AI in HR Recruiting (Cylance Blog, Dec 07 2017)
As HR teams embrace AI and machine learning to sort resumes into the appropriate candidate queues and talent pools, one must be sure to review the algorithms used to ensure the rules are legal.
In the Works – AWS IoT Device Defender – Secure Your IoT Fleet (AWS News Blog, Nov 29 2017)
“Last year I was lucky enough to tour a gigantic factory that had, on average, one environment sensor per square meter. The sensors measured temperature, humidity, and air purity several times per second, and served as an early warning system for contaminants. I’ve heard customers express interest in deploying IoT-enabled consumer devices in the millions or tens of millions.
The Death of IoT Security As You Know It (Gartner Blog Network, Dec 07 2017)
“IoT security doesn’t really exist in the classical sense as a formally defined market. I know this may cause some consternation on the part of most “IoT security” companies. But it is important that we view the development of securing IoT devices and supporting systems properly if we are going to our proper place in planning for IoT security and providing a means to adjust to a post digital-business world. It is my belief after researching IoT security for several years that the concept of IoT security itself is part of a larger historical pattern we have seen many times.”
Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones (Threatpost, Dec 06 2017)
As part of its December Android and Pixel/Nexus security updates, Google has issued patches addressing a bevy of flaws, 11 of which are rated critical.
Android Flaw Allows Attackers to Poison Signed Apps with Malicious Code (Threatpost, Dec 08 2017)
An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.
Banking trojans sneak into Google Play again (SC Magazine, Dec 11 2017)
Banking trojans have once again made their way past Google Play’s security mechanisms, this time to target the Polish Financial sector.
The Impact of GDPR On Today’s Mobile Enterprise (SC Magazine, Dec 06 2017)
While IT and business executives may have a good grasp on the need to protect their organization’s data in general, perhaps less well understood are the requirements to protect their data in the mobile enterprise.