YOU ARE AT:TagsSecurity

BROWSING: Security

Asia-Pacific, Latin America to lead cloud computing adoption; U.S., Europe remain cautious

Cloud computing apps are set to become much more popular by 2014, with Latin America and Asia-Pacific leading the way. Currently, large companies in emerging markets are the most aggressive adopters of cloud computing, while their European and U.S. counterparts remain more conservative about...

Reality Check: Protecting the mobile network and devices

Despite the increases in today’s mobile malware, many mobile operators and subscribers continue to be virtually blind to the full extent of the problem – they simply react to incidents as they occur and

Technology individualization complicates corporate IT environment

IT consumerization and the bring-your-own-device (BYOD) trend are changing companies and as consequence, their IT departments. If a couple of years ago, a company's chief information officer (CIO) was “the man” who decided all, current employees – and many high-level executives – are now...

ARM, Gemalto and Giesecke & Devrient form mobile security JV

Eyeing the growing range of connected devices, ARM, Gemalto and Giesecke & Devrient have created a joint venture focused on delivering a secure and accessible environment for advanced services running on platforms such as tablets, smart-TVs, games consoles and smartphones. All three companies will contribute...

Gartner VP: CIOs have to ‘learn to lose control a little’ over BYOD

When it comes to bring-your-own-device (BYOD) policies, chief information officers (CIOs) tend to become resistant, mostly because of management and security issues. BYOD is a trend which sooner or later will catch up with many companies, so IT managers must become more open to...

Changing telecom industry’s new challenges: monetization, security and becoming “smart pipe”

What the telecom industry has not changed in the past ten years, it is changing now – and in a drastic way. The advent of new technologies, such as mobile broadband, voice over IP (VoIP) and messaging, among others, have contributed to the shift....

Phone loss on the rise, police chiefs ask FCC to help

If you've made it through a year without losing your phone, you're beating the odds. That's according to statistics from the mobile security experts at Lookout, who say their phone-finding app locates a lost or stolen phone every 3.5 seconds. Lookout surveyed its 15...

Reality Check: Why Is Android vulnerable

Android devices are clearly the target of mobile malware with a 400% increase in Android infections in the latter part of 2011. So why is the Android platform so vulnerable?

MWC 2012: Radware stresses security and optimization

Due to the phenomenon of more and more data and video traveling over telecom networks, operators need to protect and optimize their data services, noted Radware's (RDWR) David Aviv during a conversation with RCR Wireless News. Aviv noted that the company is focusing at...

NEC acquires Argentinean security company

NEC has acquired an 85% stake of Global View, an Argentinean company that provides video surveillance services. Following closing of the transaction, Global View will operate as a subsidiary of NEC Latin America. Global View does a lot of work with municipal governments, with a...

Mobile devices create challenges for enterprise security

A recent report of security company  Check Point Software Technologies Ltd. (CHKP), named The Impact of Mobile Devices on Information Security, showed 71% of businesses believe mobile devices have caused an increase in security incidents, citing significant concerns about the loss and privacy of sensitive...

Breaking down sources of cyber crimes

Eugene Kaspersky seems to be a different CEO – at least less formal than top executives normally are. He graduated from the Institute of Cryptography, Telecommunications and Computer Science in 1987, and in 1997 co-founded the developer secure content and threat management solutions company...

Reader Forum: 10 virtualization and cloud computing predictions for 2012

Editor’s Note: Welcome to our weekly Reader Forum section. In an attempt to broaden our interaction with our readers, we have created this forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we...

2012 Predictions: Mobile security threats

During the last two years we’ve seen an increase in attacks on smartphones and mobile devices. We’ve run across rootkits, botnets and other malware. Attackers have moved on from simple destructive malware to spyware and malware that makes them money.

Reader Forum: Hackers and new forms to maliciously explore DNS

Editor’s Note: Welcome to our weekly Reader Forum section. In an attempt to broaden our interaction with our readers, we have created this forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but...

CIOs watching for 3 top IT trends

Chief information officers are looking forward to three main trends that will (and in several cases already are) challenging their own corporate strategies: consumerization, cloud computing, and mobile security and management. Pressured by chief financial officers to reduce the total cost of ownership and...

Smartphones lack security solutions

Though most people know the importance of protecting their phones, research conducted by security vendor Eset showed that 80% of smartphone users do not have a security solution, or even consider it necessary. "We see an increase in the attacks against mobile platform, especially...

Reader Forum: Are Apple products really more secure?

Editor’s Note: Welcome to our weekly Reader Forum section. In an attempt to broaden our interaction with our readers we have created this forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but...

Increasing mobile threats & attacks target Android growth

As phones are getting smarter, they are also becoming more vulnerable. Mobile threats that have existed for years are becoming more common, and a new report shows that Android phones are among those most at risk. Russian firm Kaspersky Lab, in its monthly malware...

Google puts new g.co URL shortener to work

A little while ago Google announced they had purchased the g.co domain name, and were planning to use it exclusively for linking to Google-owned sites. Their existing URL shortening service, goo.gl, was to remain for user-generated links to any URL they pleased.

AT&T teams up with Juniper Networks on mobile security

AT&T has teamed up with Juniper Networks on a new mobile security platform which it claims will better protect customer devices from security threats. Security has become a big buzz word in mobile, with firms scrambling to add protection to their mobile services either through...

AT&T teams up with Juniper Networks on mobile security

AT&T has teamed up with Juniper Networks on a new mobile security platform which it claims will better protect customer devices from security threats. Security has become a big buzz word in mobile, with firms scrambling to add protection to their mobile services either through...

Senior LulzSec member arrested in Scotland

Just a few hours ago the UK's police force announced they had arrested a member of hacking collective LulzSec in Shetland, an island off the north coast of Scotland (not, as Fox reported in the US, in London).

Users don’t protect their smartphones against threats

Hi, everyone! I’ve just started as editor-in-chief for Latin America region and this is my first post on Unplugged. I’m Brazilian and I live in São Paulo, a crazy big city with a population of 11 million people (the state, which has the same...