As the world of internet of things (IoT) grows, the number of attacks through the cyber space will continue to grow as well. Recently, with the massive worldwide spread of the ransomware, WannaCry, the threat is becoming more sophisticated and complex, as criminals find innovative ways to launch attacks. One such way is through the use of Artificial Intelligence (AI). Although, AI has a great possibility of making considerable strides in cybersecurity, it has the potential of being manipulated. As AI technology becomes smarter, it is only a matter of time until cyber criminals use it in their advantage.
Android Malware is on the rise, say researchers at G Data Security. A new report by the security firm revealed that in the first of 2017, over 750, 000 new malware apps were discovered. Android holds a 72 percent share of the mobile market and so it is reasonable that more attacks would happen on this platform. The number of malware samples cropping up each day are nonetheless staggering and there's no sign the problem will be corrected anytime soon. Since 2012, new Android malware samples have increased each year with the greatest hikes occurring over the last year.
The internet security company Malwarebytes just released its "State of Malware" report for the latter half of 2016. Highlights about individual malware threats are presented in this article. Information about the world-wide distribution of malware can be found in a companion piece about the global malware landscape. Interested readers are encouraged to read the complete report. The report is based on data Malwarebytes collected from June to November 2016.
Google has done a lot to thwart Android malware in recent months, but it's apparent there's still some work to do. Symantec recently discovered seven previously removed rogue apps that resurfaced on Google Play simply by using a new publisher and new app names. The titles masqueraded as productivity apps and would even use official Google imagery to hide their origins, but would push ads and scam websites if they were allowed to stay for four hours. It's not clear how the apps slipped through, but Google has since taken them down. We've asked the company for comment.
Wikileaks is reportedly hosting over 300 malware samples among the website's cache of leaked emails. As reported by The Register, Bulgarian security researcher Dr Vesselin Bontchev claims that the malware, of which there are at least 300 files hosted, has been found within the recent email dump of communication from the Turkish party AKP. The cache is a raw dump and Bontchev notes that there does not seem to have been any "processing of any kind" -- such as a simple malware and virus scan. As a result, the results of little more than a quick check has revealed the security risk that users of Wikileaks perusing the files now face. "Since many of the AKP members have been recipients of malware sent by e-mail (most likely random spam but could have also been targeted attacks), the received malware in the emails is also present in the dump," the researcher says.