Academia joins in battling Android malware

By Antone Gonsalves, CSO |  Security, Mobile Security

The Genome Project will make research, malware samples and mappings available to any organization submitting a formal request that includes verification of who they are. Recipients will not be required to share data in return.

One of the recipients of Jiang's malware collection was vendor Bit9. Chief Technology Officer Harry Sverdlove acknowledged that information sharing among mobile security companies is scarce, because the market is young and rivals are trying to establish as strong a foothold as possible.

"In the mobile space, it really is a greenfield," Sverdlove said. "Whoever's got the new techniques, the new heuristics, they're not just one or two [anti-virus] signatures ahead of the competition, they could be significantly ahead."

Nevertheless, the pressure to cooperate is mounting, as the U.S. government pushes the industry to co-operate on cyber-security to better protect critical information technology systems. "The threat landscape is changing so quickly that the best defense that we can do is to share information," Sverdlove said.

Read more about wireless/mobile security in CSOonline's Wireless/Mobile Security section.


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question