New Android Trojan masquerades as flash player update to install malware – International Business Times UK


International Business Times UK

New Android Trojan masquerades as flash player update to install malware
International Business Times UK
Security researchers have uncovered a new Trojan malware targeting Android smartphone users. The malware poses as a fake Adobe Flash Player app and tricks victims into granting it "special permissions" within the Android accessibility menu, which it

and more »

android security – read more

Google Touts Progress in Android Security in 2016

Google’s Android security director touts 2016 mobile OS security accomplishments from encryption, improved APIs and new developer testing tools at the RSA Conference.
Threatpost | The first stop for security news

Google: “Verify Apps” Found Few Cases Of Major Exploits – Android Headlines

Google: “Verify Apps” Found Few Cases Of Major Exploits
Android Headlines
Google puts forth a major effort to keep Android as secure as possible, and according to Android security director Adrian Ludwig, their Verify Apps framework has done a good job of that, thus far finding an extremely low number of phones infected with

and more »

android security – read more

IBM’s Watson teams up with its SIEM platform for smarter, faster event detection

San Francisco — IBM’s Watson supercomputer can now consult with the company’s security information and event management (SIEM) platform to deliver well researched responses to security events and do so much faster than a person.

Called IBM Q Radar with Watson, the new offering is the introduction of IBM’s push for a cognitive security operations center (SOC) that will be built around Watson contributing to decisions made in tandem with other security products from the vendor. IBM announced the service at the RSA Conference 2017.

In the case of Q Radar, when the SIEM catches a security event, human security analysts can choose to enlist Watson’s help analyzing the event to determine whether it fits into a known pattern of threat and put it a broader context, IBM says.

To read this article in full or to leave a comment, please click here

Network World Tim Greene