Editor’s Note: Wireless operators are a busy bunch, and as such RCR Wireless News will attempt to gather some of the important announcements that may slip through the cracks from the world’s largest carriers in a weekly wrap-up. Enjoy!
--Verizon Wireless looks again to be...
Telecoms operators have historically proven they are adept at protecting their networks. As security risks increase in scope and complexity over time, the telecommunications industry
Let’s face it: when it comes to getting something done, most of us choose the path of least resistance, opting for the easiest route to an end goal rather than a more complicated,
In today’s “socially connected” world, social media giants like Twitter and Google have become top targets for hackers and mobile devices are adding fuel to the fire. Today, hacks over social media
With the growth of data and devices rising exponentially, we’ve found ourselves in a world in which the idea of containerization – allowing users to separate their work and personal data within one device
Last year was a defining year in the communications industry, thanks to the broader commercial rollouts of LTE networks, carriers trialing small cell deployments more extensively
A new, faster Internet: Internet giants like Google and Apple are investing in making the Internet faster. A faster Web serves more content, adds and searches, which by end of the day means
Security continues to be a hot topic in the age of the smartphone as consumers are becoming increasingly comfortable storing more personal information on their mobile devices. What was once an inconvenience of having to re-input phone numbers should a wireless phone be lost,...
Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.
Fueled by the availability of low-cost/high-functioning smartphones, the data demand on mobile networks is driving investments in LTE networks worldwide....
Traditional passwords – even those containing numbers, letters, both uppercase and lowercase, and symbols – are just not good enough anymore. Hackers, like those who attacked
The U.S. Department of Homeland Security recently circulated a report to government agencies including fire departments, ambulance services and police, warning of the risks of Android mobile devices.
Since mobile devices have now officially outpaced traditional PCs as the most popular conduit to the Internet, what kind of security impact will this have in the future?
Not all hackers are bad guys. Germany's Karsten Nohl is the coder who prompted the wireless industry to improve security for GSM networks after exposing potential security flaws, and now Nohl has demonstrated a way to hack the SIM cards of an estimated 750...
For CIOs and IT managers, bring-your-own-device often seems short for “bring your own dilemma.” On the one hand, enterprises don’t want employee-provided devices undermining security, including
International communication doesn't have to be complex. In this white paper, you'll discover the challenges organizations with international travelers face to strike an appropriate balance between ease of use for those focused on being productive when traveling internationally, and the cost of using non-domestic...
The introduction of laptops and proprietary mobile devices into the corporate IT ecosystem 10 years ago allowed organizations to extract more value from their employees by extending the office both physically and
With mobility a top priority for enterprises, software firm SAP has made the move into securing content management. The company launched its SAP Mobile Documents solution at this week's Mobile World Congress event(MWC – check all pieces), noting the solution is designed to meet...
As carrier networking has evolved, operators have seen new security threats grow, such as via instant messaging.
“Spammers are sending to IM asking people to go a site, for example," said Ciaran Bradley, VP of handset security at AdaptiveMobile. At this week's Mobile World Congress...
Virtualization was the “it” trend of 2010, much like bring-your-own-device (BYOD) is the dominant trend right now. Looking back at 2010, the inhibitors of virtual desktop infrastructure are remarkably similar to the concerns around BYOD.
BlackBerry (BBRY) just can't catch a break. It's long-awaited Z10 smartphone is finally hitting the market, just as Samsung, now the world's leading maker of mobile devices, readies its own enterprise solutions.
"Checks indicate Samsung is preparing an aggressive push into the enterprise segment and...
Android malware encounters grew 2,577% during 2012, according to Cisco's 2013 Annual Security Report. Malware, software designed to damage a system or to steal money or information, is tracked by Cisco when the networking giant detects or blocks an attack. Most attacks fall into...
The domain name system (DNS) was created 30 years ago to make the Internet simpler to use and more controllable. It has evolved to ensure greater network performance, working against malware attacks. Now, DNS is being used by telecom providers to provide security and...
The tide of business mobility continues to rise as more companies realize the productivity benefits available from an always-connected workforce, and as users realize the flexibility corporate-connected