Mobile operators help customers to help themselves in battle against spam

With a recent report from the University of Minnesota and AT&T Labs revealing that more than two-thirds of mobile phone users received short message service (SMS) spam last year, there is no denying that these kinds of attacks are creating a headache for mobile phone users. However, mobile users are not the only victims, as mobile fraudsters, spammers and scammers are becoming increasingly problematic for mobile operators.

In 2012, 4.5 billion mobile spam messages were received, with 350,000 variants of...

By JF Sullivan, 31 October 2013, 0 comments. Categories: Mobile, Networks, Operators, Security.

Voice startup ‘hello’ wants you to say goodbye to Skype

A new Indiegogo campaign by the name of ‘hello’ launches today, with its founder claiming he wants to create “the Mozilla of telephony”.

Paul Grimshaw, the company’s founder, claims that the peer-to-peer voice startup is unique in that it offers complete customisation and branding, with users being able to connect between different providers and move freely between them.

For instance, Canonical could set up an...

By Ryan Daws, 07 October 2013, 0 comments. Categories: Apps, Consumers, Entertainment, Security, Smartphones, Startups.

UK prepares to defend (and fight) Cyber Warfare with new unit

Next-generation warfare doesn’t sound quite as appealing as next-generation consoles; but they have something in common, they are both likely to be technologically-based.

Internationally we are fairly versed in frontline, manned, mechanical battles; guns, tanks, ships, jets, helicopters – all the devastating machinery which has stolen too many lives.

Yet the latest, and perhaps biggest threat; many of us have in our bedrooms – the computer.

Many see the “Internet of Things” trend in a utopian...

By Ryan Daws, 30 September 2013, 0 comments. Categories: Europe, Industry, Infrastructure, Security.

Would you recruit an ex-hacker? Most IT professionals would

A survey conducted by IT recruitment specialists CWJobs.co.uk shows that 70% of IT professionals believe that hiring ex-hackers could be the solution to security problems. After all, who better to protect against intrusions than the people who do it daily?

The most high-profile case in my recent knowledge was that of infamous iOS “Jailbreaker” and PlayStation hacker GeoHot; who was snapped-up by social networking giant Facebook not long after an intense lawsuit by Sony.

Whilst the most common...

By Ryan Daws, 27 September 2013, 1 comment. Categories: Industry, Piracy, Research, Security.

Do we put too much faith in Apple (and others’) security features?

One of the highlight features of Apple’s latest iPhone, the 5S, is the inclusion of a unique fingerprint scanner – futuristically hidden underneath the device’s iconic “home” button. But are we putting too much faith in Apple (and others') security features?

According to an NBC survey, iPhones make up 58% of usage within the House of Representatives in the US – important positions; which require high security.

Yet the U.S. military did not authorise the use of Apple’s...

By Ryan Daws, 23 September 2013, 0 comments. Categories: Consumers, Industry, Mobile, Piracy, Security.

Latest revelations helped NSA store 200 million communications

Just when you think there cannot possibly be any more NSA revelations surrounding their controversial PRISM programme – we’re proven wrong. Whilst everyone remains fixated on the bigger picture, many of the smaller initiatives under the NSA’s umbrella remained unnoticed.

Meet Blarney, Fairview, Oakstar, Lithium and Stormbrew. Whilst sounding like the names of local cider manufacturers; they were in fact partnerships allowing the NSA to scan 75 percent of...

By Ryan Daws, 22 August 2013, 1 comment. Categories: Consumers, N America, Networks, Operators, Security.

Tips for landing a job: 1) Become a US whistleblower 2) Spend two months in an airport

Edward Snowden is a name you may be familiar with by now. TelecomsTech, and just about every other global publication has reported on the NSA whistleblower on several occasions.

While you'd be forgiven for thinking this is just another Snowden story, for Ed, the saga continues...

After spending over two months in Moscow’s Sheremetyevo Airport; the people’s anti-hero has been given temporary asylum in Russia for up to a year. So what on earth will he do with...

By Ryan Daws, 02 August 2013, 0 comments. Categories: Europe, Industry, Security.

Smart metering – a new security consideration for service providers

Last month saw the UK Department for Environment and Climate Change (DECC) outline its plans for the installation of smart meters across the UK, gearing up to ensure it is on course for the scheduled 2014 mass roll out.

Despite the obvious benefits that this implementation of smart metering will bring, such large-scale operations are bound to come with major security management challenges.

The prime issue is how to secure digital communications between smart metering systems and utility service providers....

By Gary Clark, 31 July 2013, 0 comments. Categories: Billing, Consumers, Infrastructure, Security.

China leads M2M growth, IPTV subscriber market (and global cybersecurity fears)

Despite growing cybersecurity concerns regarding China; the country can’t be stopped in terms of pushing technological boundaries – leading both global M2M growth and IPTV subscribers.

Throughout the second half of 2012, the number of cellular Machine-to-Machine (M2M) communications increased nearly 5.5 million. To put this in perspective; that’s the same amount as the UK had in total by the end of last year.

This places...

Huawei to be reviewed in cybersecurity of critical UK infrastructure

The UK government will be looking into Huawei’s involvement in national infrastructure over the same cybersecurity fears which resulted in a ban of the manufacturer’s equipment in the United States after failing to prove the company has no association with the Chinese government.

TelecomsTech first reported on the US situation where – along with rival firm ZTE – “the two firms had failed to demonstrate the absence of Chinese...

By Ryan Daws, 18 July 2013, 0 comments. Categories: Europe, Industry, Infrastructure, LTE, N America, Networks, Security, Telematics.