The Dawn of Open Collaboration in Mobile Security: 360 Takes the Lead

The Dawn of Open Collaboration in Mobile Security: 360 Takes the Lead

In an era of rapid innovation and entrepreneurship, the concept of open collaboration has become a common thread across various industries. Baidu’s Apollo artificial intelligence, Alibaba’s City Brain, and JD.com’s blockchain traceability are just a few examples of how open collaboration has transformed the landscape of technology. However, when it comes to mobile security, the situation is grim. The current state of the industry has been unable to address systemic safety risks, making open collaboration a pressing need.

On January 22, 360, a leading technology company, and the Mobile Security Alliance (MSA) launched the “Pioneer” action plan at the “Arrow Through the Clouds” vulnerability media communication event. This initiative aims to help mobile phone manufacturers reduce the time spent on patch decentralization and fix bugs more quickly, ultimately reducing the loss of customers. The launch of this program marks the beginning of the open collaboration concept in the field of mobile security.

The Grim Reality of Mobile Security

The mobile security industry has been plagued by frequent security issues, which have become a major concern for mobile phone manufacturers and users alike. According to industrial data, the production of black and gray goods has already reached over 100 billion in 2016, while the network security industry in China is estimated to be over 40 billion in 2017. The mobile phone Trojan virus has shown a rapid upward trend, nearly doubling in the fourth quarter of 2016.

The so-called black production refers to the illicit proceeds obtained by direct invasion of mobile phone users. For example, not clicking on strange links, forwarding short text messages, or automatically downloading Trojan viruses can compromise the security of electronic payments and other mobile phone functions. The degree of harm caused by these threats is further escalated by their ability to deep into the bottom of the system, especially in the open source, widely used on Android smartphones and tablets.

The Arrow Through the Clouds Vulnerability

The “Arrow Through the Clouds” vulnerability is a typical example of a remote completely break Google Pixel phone combination vulnerability based on the presence of the underlying system. This vulnerability can affect all applications on mobile devices, including basic phone messages, and is a systemic risk that requires a collaborative effort to address.

The Google Alpha team leader, Gong, was awarded a $112,500 reward for discovering this vulnerability, which is the highest award given by Google in the history of the Android Vulnerability Reward Program (ASR). This loophole allows all application frameworks on top of the system to be affected, causing a systemic harm.

The Social Impact of Network Telecommunications Fraud

The news is often filled with reports of huge property losses, millions, tens of millions, and corporate bankruptcy due to network telecommunications fraud. According to authoritative media reports, between 2013 and 2016, there were over 94 cases of telecommunications network fraud cases that cheated a total of over 10 million yuan. An average of every 15 persons received a telephone fraud, making it a major nuisance.

Solving the “Demand” Problem through Open Collaboration

The grim situation in the mobile security industry has led to the realization that open collaboration is the best way to address the deficiency. The “Pioneer” action plan, launched by 360 and the MSA, is a typical mode of open collaboration in the field of mobile security. Its value lies in the following:

  1. Vulnerability and virus found aspects: Security vendors, terminal manufacturers, and application vendors resources cooperation to cover as much of the vulnerability or virus, reducing the likelihood of black produced dead ends.
  2. Collaboration ability of anti-vulnerabilities: 360 and other leading technology vendors share their plan to help participants to better collaborate on the platform to enhance the technical level and addresses the vulnerability.
  3. Rate of “Pioneer” with the MSA program can patch the vulnerability associated with the program, whether it is 360 or other participants, identify vulnerabilities, vulnerability risk information to share information, such as the first time defense program, terminal manufacturers can in the shortest time bug fixes, or emergency then be updated with Google’s all hot patches to avoid the time difference.

Toward a New Era of Open Collaboration

The “Pioneer” program is a move towards the safety of open collaboration, which is the proper meaning of mobile security. The situation is grim, but insufficient to deal with when being taken seriously and practiced down. The state-level technology is supported by most leading industry consortium, Mobile Security Alliance members to actively share their technology collaboration, China Mobile manufacturers to become the world’s mobile security bug fixes “pioneer” is also boosting.

Building the future security cornerstone of the great development of the mobile Internet in the mobile security threat facing mankind, this is great opportunity to secure the era of Chinese technology utilizes the advantages of open collaboration corners overtaking.