Google Play App Suspensions Jump 66%

Infosecurity Magazine | February 15, 2019

Google has claimed it’s getting better at spotting bad apps on its Play Store marketplace, with the number of rejected submissions and suspensions both growing into the double digits last year. The Android platform has often been criticized by security experts for being more exposed to cyber-threats due to it being relatively open compared to Apple’s ecosystem. However, Google Play product manager, Andrew Ahn, claimed that thanks to new initiatives the firm has managed to increase rejected app submissions by over 55% and app suspensions by more than 66% in 2018. “In 2018, we introduced a series of new policies to protect users from new abuse trends, detected and removed malicious developers faster, and stopped more malicious apps from entering the Google Play Store than ever before,” he said. “These increases can be attributed to our continued efforts to tighten policies to reduce the number of harmful apps on the Play Store, as well as our investments in automated protections and human review processes that play critical roles in identifying and enforcing on bad apps.”

Spotlight

In this paper, system describe in MANET energy saving & security in data is an important issue in MANET. This can be solved by network coding which might reduce energy consumption also by using less transmission this system proposed data sharing using data encryption method. Encryption/decryption cost along with transmission time is factor of energy consumption in wireless network. In MANET unreliable wireless media, mobility, lack of infrastructure is a big challenge. Mobile Ad hoc NETwork (MANET) refers to mobility of nodes rather than any fixed infrastructure, act as a mobile router.

Spotlight

In this paper, system describe in MANET energy saving & security in data is an important issue in MANET. This can be solved by network coding which might reduce energy consumption also by using less transmission this system proposed data sharing using data encryption method. Encryption/decryption cost along with transmission time is factor of energy consumption in wireless network. In MANET unreliable wireless media, mobility, lack of infrastructure is a big challenge. Mobile Ad hoc NETwork (MANET) refers to mobility of nodes rather than any fixed infrastructure, act as a mobile router.

Related News

DATA SECURITY

Cyber Intelligence Expert's Firm Launches New Security Tool to Detect and Defend Threats to Critical National Infrastructure

The Bellwether Group | October 28, 2021

Timed to coincide with the new U.S. focus on cyber security in the critical infrastructure, The Bellwether Group introduces VAULT Systems, a custom hardware and intelligent software platform capable of visualizing data and detecting, defending and mitigating cyber threats to critical national infrastructure. The announcement coincides with the July 28, 2021, National Security Memorandum issued from the White House that targets cybersecurity threats as "the most significant and growing issues confronting our Nation." "The Memorandum establishes a voluntary initiative intended to drive collaboration between the federal government and the critical infrastructure community to improve the cybersecurity of control systems. VAULT Systems can help the critical infrastructure community improve their cybersecurity posture,Critical infrastructure includes electric, water, oil and natural gas, transportation, food and beverage distribution, as well as interconnected systems such as maritime and port operations, air traffic control, and dams. The Bellwether Group CEO and founder Tim Teal "We are launching VAULT Systems custom hardware and intelligent software platform, specifically designed to decipher, monitor and protect critical infrastructure," said Teal. The new VAULT Systems leverages best-in-class ICS (Incident Command System) and SCADA (Supervisory Control and Data Acquisition) equipment data collection and visualization tools from IoT International, as well as custom cyber network defense and forensics analytics developed by The Bellwether Group, Inc. This combination will enable operators to monitor equipment, and identify and actively deter cyber threats in real time. Teal recently retired from the U.S. Cyber Command as the Director of J6/J8/J9 of the Cyber National Mission Force at US Cybercommand. He was also a founding member of the National Security Agency's "Hunt Mission," which deployed tactical tools and capabilities to detect and eradicate network adversaries across the Department of Defense. This background and knowledge of cyber operations and defense enables The Bellwether Group to add unparalleled tools and capabilities to protect critical infrastructure. About The Bellwether Group Founded two years ago by U.S. cybersecurity expert, Tim Teal, the Bellwether Group is a veteran-owned and operated small business in Maryland. In addition to VAULT Systems, The Bellwether Group also has a custom hardware and software product line called Vimana™. The Vimana™ platforms are designed to support cyber operations globally through advanced artificial intelligence situational awareness software and state of the art cyber tools.

Read More

DATA SECURITY

GBA to Launch Cyber Supply Chain Threat Mitigation Subsidiary

Global Business Alliance | July 19, 2021

The Global Business Alliance (GBA) has announced the launch of GBA Sentinel. It is a wholly-owned subsidiary that focused on assisting worldwide companies in identifying and addressing possible supply chain and cyber susceptibilities rapidly. Global companies know it is authoritative for the private sector to cooperate with federal agencies to confirm a safer atmosphere. Through GBA Sentinel, worldwide businesses can gain access to industry-leading supply chain risk management compliance tools of Fortress Information Security. Fortress exclusively delivers actionable risk visions on the supply chain ecosystem of resources and sellers, thereby allowing companies to alleviate their cybersecurity risks and assure controlling compliance logically. Today, Fortress secures the supply chains of dangerous infrastructure for more than 40 percent of the U.S. power grid. In addition, it works carefully with key federal agencies to improve their supply chain cyber flexibility. This inventiveness is a first for the Global Business Alliance, representing 200 of the major global companies operating in the US. About the Global Business Alliance The Global Business Alliance (GBA), as the premier voice of international companies in the United States, energetically encourages and protects an open economy that welcomes global companies to invest in America. Our associates are American companies with worldwide heritage and a crucial part of our nation's economic success. When America is open for business, we all take advantage of it.

Read More

DATA SECURITY

Herjavec Group, a Global Cybersecurity Leader, Accelerates Growth with Acquisition of SEGMENTECH

Herjavec Group | October 14, 2021

Robert Herjavec, Founder & CEO of global cybersecurity firm Herjavec Group and a leading investor on the Emmy Award-winning show Shark Tank, proudly announces the strategic acquisition of SEGMENTECH, a North American cybersecurity services firm specializing in Identity and Access Management (IAM) & Privileged Access Management (PAM) solutions for enterprise customers. This acquisition further expands and accelerates Herjavec Group's leading IAM practice by adding world-class Privileged Access Management talent, specializing in implementations of CyberArk, a global leader in Identity Security. "As we have transitioned to a flexible workforce environment, businesses have been forced to accelerate and pivot their digital transformation," said, Robert Herjavec. "As a result, CIOS and CISOs are navigating a paradigm shift in cybersecurity, and the way their security environment needs to be set up. IAM and PAM have become foundational to all security programs, to ensure that the right people access the right data, at the right time, for the right reasons. As a result, we are experiencing a tremendous uptick in demand for services to implement comprehensive IAM and PAM programs." Founded in 2015 by Roy Levy and Boris Zaidfeld, SEGMENTECH is a leading provider of IAM & PAM services and is an expert advisor in DevSecOps and how to secure CI/CD processes. SEGMENTECH supports global enterprise customers through the implementation and expansion of IAM and PAM programs. Both Herjavec and SEGMENTECH are established partners of CyberArk. With this acquisition, Herjavec will further advance its privileged access management practice by putting CyberArk at the core, which enables a security-first approach to decreasing identity-led risk. This acquisition strengthens Herjavec Group's position as an Identity and Access Management leader and will benefit organizations seeking to fortify their cybersecurity defenses,CyberArk has strong relationships with both Herjavec and SEGMENTECH. Their commitment to investing in highly trained cybersecurity professionals, especially in the area of privileged access management, combined with expanded access to CyberArk-based Identity Security solutions, will dramatically improve security for our joint customers. Chris Moore, VP of Global Channel at CyberArk. Herjavec Group and SEGMENTECH customers will benefit from working with highly qualified professionals, including those who have achieved their Guardian certification, the highest level of CyberArk training and a proven track record of capabilities, ensuring enterprises can accelerate, improve, and manage their cybersecurity lifecycle. About Herjavec Group: Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity products and services to enterprise organizations. We have been recognized as one of the world's most innovative cybersecurity operations leaders, and excel in complex, multi-vendor environments. Our service expertise includes Advisory Services, Technology Architecture & Implementation, Identity and Access Management Services, Managed Security Services, Threat Management, and Incident Response. Herjavec Group operates across the United States, United Kingdom, India and Canada.

Read More