Even if cybercriminals haven’t quite cracked machine learning yet, honest developers and security testers should get onboard the AI train anyway. It may be the best thing for mobile security since the dawn of the mobile OS and the apps that run on it.
On August 10th Ken Lloyd, Chief Technical Officer and Co-Founder of Mi3 Security and board member for CMDSP (Credentialed Mobile Device Security Professionals) will explain the leading Enterprise Mobility Credential, CMDSP and discuss the latest mobile security technologies that impact the IT Mobile Administrator.
The new generation of conversational assistants or chatbots for mobiles come the closest ever to making your Android or iOS device seem like a human companion. So, you could be forgiven for trying to appeal to a machine’s sense of ethics, if it looks like a chatbot was responsible for your mobile bank account being emptied or your personal data stolen.
Unfortunately for attendees of the BlackHat and DefCon 2017 conferences on IT and cyber security, this could become all too true. Unlike others on wild sprees in the gambling capital of America who would dearly like to leave all the evidence behind them, these conference attendees could be leaving valuable personal or company data, if the super-hackers have their way.
From a hacker’s point of view, healthcare has it all. There’s confidential personal data in abundance, including health information and social security details, mobile apps with sloppy security, and healthcare institutions and end users who can’t or won’t accept their vulnerability as targets. The road to IT security hell is being paved with good intentions and a strong dose of denial (“it’ll never happen to our clinic”). Consequently, cybercriminals have been flocking to healthcare sector to partake in the pickings.
The age of the car app is upon us. You can use the manufacturer’s app for your shiny new BMW, for example, to find your car in crowded parking lots, light the lights, honk the horn, and defrost it when temperatures are subzero, all remotely. That’s the good news. The bad news is that apps mean security holes that can be exploited by bad actors, and they won’t just be flashing your headlights or sounding your car horn.
Many cities are already embarking on creative uses of systems, data, and applications, engaging with vendors, operations departments, and mobile device users to make life easier, be responsive, and cut expenses. However, security remains a critical issue. Among other things, smart cities multiply the opportunities of data theft and system sabotage for bad actors lying in wait for a chance to strike.