The promise of a smart cars connected to smart cities is certainly exciting – traffic lights that respond to real-time fluctuations in road congestion, streamlined navigation, time and cost savings, enriched services, new business opportunities plus overall conveniences that simplify our lives. But, it’s...
Pakistani government wanted BlackBerry to share data generated by enterprise clients
Canadian company BlackBerry plans on leaving the Pakistan market following a disagreement with the Pakistan Telecommunications Authority regarding access to information stored on BlackBerry Enterprise Services servers.
BlackBerry COO Marty Beard laid out the situation...
We all love Wi-Fi networks, but security on Wi-Fi is a serious issue. Their open nature makes them targets of abuse. According to a recent roundup of “23 Disturbing Statistics on Mobile Security,” Wi-Fi networks with “free” in the name are responsible for nearly...
WASHINGTON – As the "Internet of Things" becomes a staple of the conversation across all aspects of the economy, there’s a growing concern around how to secure all these new connections.
At the recent Federal Building Council event, many participants analogized that creating an IoT network is...
A well-publicized hack of a 2014 Jeep Cherokee earlier this year by security experts working with Wired magazine resulted in the recall of 1.4 million vehicles by Fiat-Chrysler Automobiles, a hasty (and successful) network-level fix pushed out by Sprint to address the vulnerability, and...
FCC fines Cox for 2014 data breach orchestrated by ‘Lizard Squad’ hacker group
Cox Communications agreed to pay a $595,000 fine to the Federal Communications Commission tied to a 2014 data breach that exposed customers’ personal information to third parties.
The FCC said the settlement with...
Vodafone UK claims attack gained limited customer data from 1,827 customers
Vodafone Group reported its United Kingdom operations late last week were hit by a cyberattack that gained access to account information of 1,827 customers, including names, telephone numbers, bank short codes and the last...
Connected cars are already driving the machine-to-machine space, research firm Infonetics has concluded. Gartner predicts there will be a quarter-billion connected vehicles on the road by 2020, with new vehicles dramatically increasing the proportions of connected cars – and added that “the proliferation of vehicle connectivity...
Researchers have discovered they can hack voice over LTE implementations on two tier-one mobile carrier networks, gaining access to free data usage or shutting down voice or data access for another user.
A recently published paper (pdf) by academics at the University of California Los Angeles, The...
Passwords may be headed toward obsolescence. This is a potential paradigm shift in the way people access smartphones, personal computers, websites and many other password-protected technologies.
Why is it happening?
One reason is the intensifying consumer dissatisfaction with passwords.
People are becoming less comfortable that the sensitive personal...
Session initiation protocol trunking has a bad reputation. But like other forms of emerging technologies, people who don’t quite understand how it works tend to perpetuate fear rather than learn how it can be a vital communications backbone to any business. There are stories...
WASHINGTON – Academic think tank the Brookings Institute hosted a panel on Oct. 21 to discuss the emerging economic force that is the "Internet of Things" and how it is transforming the global economy.
Panelists included Glenn Lurie, CEO at AT&T Mobility; former Federal...
We are a country full of busy people on the move. We’re migrating in greater numbers to urban areas, and travel more for work and pleasure. For the most part, we plan our own travel and are always on the lookout for ways to...
The NFC Forum has released one new and three candidate specifications for near-field communications, which target improved radio frequency support, better interoperability and a new tag operation format that opens up new use cases, according to the organization.
The new NFC standard deals with NFC...
What companies do you trust with your personal data such as health details, credit card numbers and financial information?
Consumers all over the world are grappling with this question.
In fact, more than half (54%) of digital consumers are cautious about the personal information they share...
Reports indicate at least five lawsuits filed against T-Mobile US and Experian connected to data hack
The recent hack of consumer data at one of T-Mobile US’ vendors has drawn at least five lawsuits, according to reports.
Bloomberg Business said the data breach, which included personal...
AT&T NFV and SDN plans are set to power software-based security systems
AT&T’s network transformation moves using software-defined networking and network functions virtualization is creeping into security applications.
The telecom giant said it has begun to tap its SDN and NFV platforms to power software-based security...
T-Mobile US vendor Experian hit by hackers in attack dating back more than 2 years, impact could be beyond current customers
Updated to note impact could include people who did not become T-Mobile US customers.
T-Mobile US has been hit by hackers in an attack that...
Booz Allen may not be a name that immediately comes to mind when thinking about automotive cybersecurity, but it should as the company has a practice that looks specifically at security. A team of automotive and cybersecurity experts work with automotive original equipment manufacturers...
Businesses have realized tremendous efficiency gains with the advent of cloud-based services and mobile computing, driving down operational costs and creating unprecedented growth opportunity. However, these technologies, along with the arrival of the “app store economy” and the deployment of intelligent connected devices, are...
Consumers want one security solution for all devices
WASHINGTON – Software firm Nominum has released a survey showing the recent spate of high-profile cyber attacks is making cybersecurity weigh heavily on the minds of consumers.
The survey was conducted in July and includes responses from 1,106 people.
The...
Hearing about the latest concerning data breach seems to be an increasing occurrence, and, following from that, cybersecurity is an increasingly hot topic. Cable and Internet provider Comcast is no exception; the company this week agreed to pay a $33 million fine related to...
WASHINGTON – Two Democratic members of the Senate Committee on Commerce, Science, and Transportation have sent letters to the CEOs of 18 major automakers asking that they conduct a comprehensive overview of vehicles' vulnerabilities to hacking, and elaborate on what they are doing to...
Of 10 travel apps reviewed, Bluebox Security found security is a ‘second-class factor’
WASHINGTON – A new report published by mobile security and application management firm Bluebox Security raises questions as to whether app companies are investing enough in security. In a report published Sept....