BROWSING: Security
Reality Check: Busting myths and misconceptions about SIP trunking security
Session initiation protocol trunking has a bad reputation. But like other forms of emerging technologies, people who don’t quite understand how it works tend to perpetuate fear rather than learn how it can be a vital communications backbone to any business. There are stories...
AT&T, CTIA CEOs talk IoT at Brookings Institute
WASHINGTON – Academic think tank the Brookings Institute hosted a panel on Oct. 21 to discuss the emerging economic force that is the "Internet of Things" and how it is transforming the global economy.
Panelists included Glenn Lurie, CEO at AT&T Mobility; former Federal...
Reality Check: Identity verification in the on-demand service economy
We are a country full of busy people on the move. We’re migrating in greater numbers to urban areas, and travel more for work and pleasure. For the most part, we plan our own travel and are always on the lookout for ways to...
Test and Measurement: New NFC standards focus on RF, interoperability
The NFC Forum has released one new and three candidate specifications for near-field communications, which target improved radio frequency support, better interoperability and a new tag operation format that opens up new use cases, according to the organization.
The new NFC standard deals with NFC...
Reality Check: Dealing with declining digital trust among consumers
What companies do you trust with your personal data such as health details, credit card numbers and financial information?
Consumers all over the world are grappling with this question.
In fact, more than half (54%) of digital consumers are cautious about the personal information they share...
T-Mobile data hack draws lawsuits
Reports indicate at least five lawsuits filed against T-Mobile US and Experian connected to data hack
The recent hack of consumer data at one of T-Mobile US’ vendors has drawn at least five lawsuits, according to reports.
Bloomberg Business said the data breach, which included personal...
AT&T NFV, SDN efforts to bolster security platforms
AT&T NFV and SDN plans are set to power software-based security systems
AT&T’s network transformation moves using software-defined networking and network functions virtualization is creeping into security applications.
The telecom giant said it has begun to tap its SDN and NFV platforms to power software-based security...
T-Mobile customers data hacked; Social Security numbers among data breached
T-Mobile US vendor Experian hit by hackers in attack dating back more than 2 years, impact could be beyond current customers
Updated to note impact could include people who did not become T-Mobile US customers.
T-Mobile US has been hit by hackers in an attack that...
EMEA: Booz Allen talks automotive cybersecurity
Booz Allen may not be a name that immediately comes to mind when thinking about automotive cybersecurity, but it should as the company has a practice that looks specifically at security. A team of automotive and cybersecurity experts work with automotive original equipment manufacturers...
Reader Forum: Breaking the ‘code’ of silence to build trust into business applications
Businesses have realized tremendous efficiency gains with the advent of cloud-based services and mobile computing, driving down operational costs and creating unprecedented growth opportunity. However, these technologies, along with the arrival of the “app store economy” and the deployment of intelligent connected devices, are...
IoT anxiety laid out in security report
Consumers want one security solution for all devices
WASHINGTON – Software firm Nominum has released a survey showing the recent spate of high-profile cyber attacks is making cybersecurity weigh heavily on the minds of consumers.
The survey was conducted in July and includes responses from 1,106 people.
The...
Comcast data breach to cost $33 million
Hearing about the latest concerning data breach seems to be an increasing occurrence, and, following from that, cybersecurity is an increasingly hot topic. Cable and Internet provider Comcast is no exception; the company this week agreed to pay a $33 million fine related to...
Senators ask auto industry for better cybersecurity
WASHINGTON – Two Democratic members of the Senate Committee on Commerce, Science, and Transportation have sent letters to the CEOs of 18 major automakers asking that they conduct a comprehensive overview of vehicles' vulnerabilities to hacking, and elaborate on what they are doing to...
Report: Security is a low priority for app makers
Of 10 travel apps reviewed, Bluebox Security found security is a ‘second-class factor’
WASHINGTON – A new report published by mobile security and application management firm Bluebox Security raises questions as to whether app companies are investing enough in security. In a report published Sept....
Report: Mobile ransomware use on the rise
Malware will lock users out of their devices then demand money transfer to regain access
WASHINGTON – How much would you pay to have your smartphone released if it were hijacked? It sounds like a joke, but according to the Cisco 2015 Midyear Security Report,...
EMEA: BT Global Services ethical hacking secures the connected car
Recently I had an opportunity to meet with Martin Hunt, senior business development director of the automotive industry practice for BT Global Services, to better understand how BT is working in the connected car space. It’s important to clarify that BT Global Services is just...
Reader Forum: Why the rise in secure data affects the mobile operator
Since 2009, there has been a significant push to encrypt all Web traffic in order to protect Internet users against surveillance of the content of their communications. The goal was to transition from HTTP, which is notorious for being easy to manipulate, to the...
SouthernLINC LTE network to offer ‘mission critical’ services
Regional wireless provider to support parent company, target enterprises and local governments
Regional wireless telecom provider SouthernLINC is set to offer what it’s calling “mission critical” LTE services to parent company Southern Company and entities in Southern Company’s service area.
SouthernLINC said the service would take...
New worm exposes Apple security risks
Thunderstrike 2 infects firmware; fix is to re-flash chip
Two computer researchers have created a new firmware worm, Thunderstrike 2, which calls into question the airtight security usually associated with Apple MacBook products.
The research, which has resulted in a proof-of-concept, was done by Xeno Kovach...
Is network security the biggest challenge to IoT?
IoT is a hot topic at National Instruments' ongoing NI Week
AUSTIN, Texas – National Instruments kicked off its annual NI Week on Aug. 3, and among the first round of presentations was a forward-looking panel discussion about the future of the "Internet of Things."
Moderated...
Reality Check: In search of better authentication in an IoT world
In 2013, according to IDC, the digital universe contained 4.4 zettabytes of data. By 2020, that figure will surge to 44 zettabytes. This 10x jump in data is the result of the explosion of mobile devices, cloud services and the millions of sensors and...
HP: 100% of smartwatches have major security flaws
Smartwatches are a huge security risk according to a new study by Hewlett-Packard. HP tested 10 different smartwatches and found that 100% were vulnerable to cyber attacks.
The vulnerabilities include insufficient authentication, lack of encryption and privacy concerns, according to HP Fortify.
The study found, “Smartwatches...
CCA Webinar: Addressing Cyber Threats with Best Practices – A Practical Approach
Cyber threats, secret intrusions and very public data breaches are now part of everyday threats, and the types and vectors of threats are bewildering. In addition to cyber criminals, carriers have to be worried about regulatory threats and enforcement actions. And the number of...
MasterCard looks to selfies as PIN of the future
Swapping biometric data for traditional security measures presents challenges and opportunities
WASHINGTON – Global financial services company MasterCard is reportedly testing the possibility of adding facial recognition as a security measure for online purchases.
Fraud is now the world’s No. 1 criminal enterprise, costing consumers and...