The emergence of malicious software for Google’s Android operating system has been one of the biggest security stories of the last two years. But Google is arguing that much of that reporting is hype, saying its own data shows hardly any evidence of infections of mobile devices running Android. Speaking at the recent Virus Bulletin Conference in Berlin, Google mobile researcher Adrian Ludwig presented data that suggests the number of true infections from malicious software are vanishingly small – even in the unregulated independent Android marketplaces. But mobile security experts wonder if Google’s data isn’t burying legitimate security concerns about its mobile operating system. The explosion of Android malware has been so well documented as to become almost a truism in the security world. McAfee in August reported a 35 percent growth in Android malware that included “SMS-stealing banking malware, fraudulent dating and entertainment apps, weaponized legitimate apps and malicious […]
Tag: Mobile
IDC: 30 Billion Autonomous Devices By 2020
The official “numbers guys” (and gals) of the technology business over at IDC have just come out with a new report on The Internet of Things and it has some eye-popping numbers. Top among them: an (estimated) 30 billion autonomous “connected things” deployed by the end of this decade. The report, “Worldwide Internet of Things (IoT) 2013-2020 Forecast: Billions of Things, Trillions of Dollars” is a market outlook for the IoT ecosystem, which IDC says comprises “intelligent systems, connectivity services, platforms, analytics, and vertical applications” it also includes professional services and security for IoT infrastructures. While IP-enabled things aren’t exactly “new,” the IoT is being driven by factors that haven’t been common previously, namely: ubiquitous, wireless Internet connectivity, regardless of location, notes IDC analyst Carrie MacGillivray. IDC says the trend lines are pointing up in a serious way, with IoT related economic activity to grow at a 7.9% compound annual […]
Beyond ‘Likes’: CrowdOptic Uses Google Glass To Map Your Focus
Sometimes a technology becomes so ubiquitous and obviously useful that we (humans) cease to think critically about its shortcomings. As an illustration of this, imagine yourself teleported back in time to the island of Manhattan in 1900. You’d find a bustling metropolis, for sure. You might look around and notice that the people dressed differently, or that the skyline was different from what we’re used to. But I bet one of the things you’d notice first was the stench emanating from the piles of horse manure and puddles of urine. As this (great) post at The Daily Kos points out, there were 200,000 horses working in New York City by 1900. Those horses were dropping 4 million pounds of manure and 40,000 gallons of urine on city streets every day. “The ubiquitous street sweepers could only pile the stuff up in vacant lots, occasionally to the height of sixty feet. To […]
Losing The Future: Schneier On How The Internet Could Kill Democracy
With his deep background in both cryptography and Internet security, Bruce Schneier is of the most thoughtful commentators on all matters cyber. So revered is he, that he even inspired a list of humorous Chuck Norris-style “Bruce Schneier” facts . In recent months, Bruce has been an invaluable sounding board amid the drip-drip-drip of details of ubiquitous government surveillance stemming from Edward Snowden’s leak of classified intelligence on NSA spying and cyber operations. In this video, from a recent speech Bruce did at the TEDxCambridge event up here in the Boston area, he goes a bit deeper: drawing out the current trend lines like hacktivism, Facebook- and Twitter-fueled popular revolutions, civil war and mass surveillance, and trying to discern what the future might look like. /div> Bruce’s theory: although nimble groups of activists, dissidents and hackers have been more adept at using the Internet and innovative technologies and platforms built on […]
Privacy Collision: Data On How You Drive Reveals Where You Drive
A heads up to Jaikumar Vijayan over at Computerworld.com for picking up on this really interesting study (PDF) conducted at the University of Denver that shows how driver monitoring technology that is becoming very popular in the insurance industry may constitute a big breach of privacy. If you haven’t heard of them before, use-based insurance (or so-called “Pay as You Drive” or PAYD) programs are all the rage in the auto insurance industry. They make a lot of sense: rather than penalize good drivers for the crummy driving of others, leverage on board technology within the insured vehicle to monitor the miles traveled, speed, braking and other vital statistics. The technology allows infrequent, safe drivers to pay much lower premiums, while drivers who rack up tens of thousands of miles a month, or career around the roads at breakneck speeds to pay premiums that are appropriate given the amount of driving and […]