YOU ARE AT:TagsSecurity

BROWSING: Security

Carrier Wrap: Verizon Wireless further delays VoLTE, aces J.D. Power network survey

Editor’s Note: Wireless operators are a busy bunch, and as such RCR Wireless News will attempt to gather some of the important announcements that may slip through the cracks from the world’s largest carriers in a weekly wrap-up. Enjoy! --Verizon Wireless looks again to be...

Reality Check: Cyber threats: How prepared are telcos to defend their turf?

Telecoms operators have historically proven they are adept at protecting their networks. As security risks increase in scope and complexity over time, the telecommunications industry

2014 Prediction: The rising conflict between ease-of-use and security

Let’s face it: when it comes to getting something done, most of us choose the path of least resistance, opting for the easiest route to an end goal rather than a more complicated,

Reality Check: Two-factor authentication 101 – the key to de-coding a social hacker’s playbook

In today’s “socially connected” world, social media giants like Twitter and Google have become top targets for hackers and mobile devices are adding fuel to the fire. Today, hacks over social media

2014 Predictions: Expansion of ‘containerization’ – it won’t be about devices anymore

With the growth of data and devices rising exponentially, we’ve found ourselves in a world in which the idea of containerization – allowing users to separate their work and personal data within one device

2014 Predictions: Network security, NFV and the ‘Internet of things’

Last year was a defining year in the communications industry, thanks to the broader commercial rollouts of LTE networks, carriers trialing small cell deployments more extensively

2014 Predictions: A new, faster Internet – with optimized protocols

A new, faster Internet: Internet giants like Google and Apple are investing in making the Internet faster. A faster Web serves more content, adds and searches, which by end of the day means

Spotlight: NexID looks to put its finger on device security

Security continues to be a hot topic in the age of the smartphone as consumers are becoming increasingly comfortable storing more personal information on their mobile devices. What was once an inconvenience of having to re-input phone numbers should a wireless phone be lost,...

Reality Check: The security imperative for LTE networks

Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences. Fueled by the availability of low-cost/high-functioning smartphones, the data demand on mobile networks is driving investments in LTE networks worldwide....

Reality Check: The death of passwords and the rise of multi-factor authentication

Traditional passwords – even those containing numbers, letters, both uppercase and lowercase, and symbols – are just not good enough anymore. Hackers, like those who attacked

Reality Check: Malware risks require deeper understanding of BYOD threats and security

The U.S. Department of Homeland Security recently circulated a report to government agencies including fire departments, ambulance services and police, warning of the risks of Android mobile devices.

Reader Forum: Mobile’s latest threat: Is your phone a zombie?

Since mobile devices have now officially outpaced traditional PCs as the most popular conduit to the Internet, what kind of security impact will this have in the future?

SIM card upgrade should prevent hacking

Not all hackers are bad guys. Germany's Karsten Nohl is the coder who prompted the wireless industry to improve security for GSM networks after exposing potential security flaws, and now Nohl has demonstrated a way to hack the SIM cards of an estimated 750...

Reality Check: How enterprises and mobile operators can maximize security

For CIOs and IT managers, bring-your-own-device often seems short for “bring your own dilemma.” On the one hand, enterprises don’t want employee-provided devices undermining security, including

White Paper: The International Roaming Problem: How to Balance Cost, Connectivity, and Security Concerns

International communication doesn't have to be complex. In this white paper, you'll discover the challenges organizations with international travelers face to strike an appropriate balance between ease of use for those focused on being productive when traveling internationally, and the cost of using non-domestic...

Reader Forum: The myth of BYOD – Why network access is the key to security

The introduction of laptops and proprietary mobile devices into the corporate IT ecosystem 10 years ago allowed organizations to extract more value from their employees by extending the office both physically and

MWC 2013: SAP moves to secure content management

With mobility a top priority for enterprises, software firm SAP has made the move into securing content management. The company launched its SAP Mobile Documents solution at this week's Mobile World Congress event(MWC – check all pieces), noting the solution is designed to meet...

MWC 2013: AdaptiveMobile looks to protect network moves to all-IP LTE

As carrier networking has evolved, operators have seen new security threats grow, such as via instant messaging. “Spammers are sending to IM asking people to go a site, for example," said Ciaran Bradley, VP of handset security at AdaptiveMobile. At this week's Mobile World Congress...

Reality Check: Be secure, not ‘virtually’ secure

Virtualization was the “it” trend of 2010, much like bring-your-own-device (BYOD) is the dominant trend right now. Looking back at 2010, the inhibitors of virtual desktop infrastructure are remarkably similar to the concerns around BYOD.

BlackBerry takes a hit as Samsung readies enterprise platform

BlackBerry (BBRY) just can't catch a break. It's long-awaited Z10 smartphone is finally hitting the market, just as Samsung, now the world's leading maker of mobile devices, readies its own enterprise solutions. "Checks indicate Samsung is preparing an aggressive push into the enterprise segment and...

As malware goes mobile, enterprises rethink strategies

Android malware encounters grew 2,577% during 2012, according to Cisco's 2013 Annual Security Report. Malware, software designed to damage a system or to steal money or information, is tracked by Cisco when the networking giant detects or blocks an attack. Most attacks fall into...

Carriers adopting DNS for security and network optimization

The domain name system (DNS) was created 30 years ago to make the Internet simpler to use and more controllable. It has evolved to ensure greater network performance, working against malware attacks. Now, DNS is being used by telecom providers to provide security and...

Reality Check: Nine critical threats facing mobile workers

Mobile devices, whether employee or company-owned, are the new security wild west. They are open devices that mix business with pleasure.

Reader Forum: Carriers, don’t overlook the bigger BYOD opportunity

The tide of business mobility continues to rise as more companies realize the productivity benefits available from an always-connected workforce, and as users realize the flexibility corporate-connected