Emerging Threats combats millions of new malware a week

There are 250,000 plus new pieces of malware being produced each day equating to one piece per person in the US in just over three and a half years. The question is, what do you do with this onslaught of algorithms which are written with malicious intent in mind? One company, Emerging Threats thinks they can help with part of the equation… Identification of the sites which are compromised.

I recently met with the company at Interop in Las Vegas to learn about their IP and domain...

By Rich Tehrani, 21 May 2013, 0 comments. Categories: Big Data, Infographic, Security.

Virtual Coins – what will this mean for the payments space?

Forget £, $, €, or the whole host of other international currencies, the new kid on the block is virtual currencies; which live on the web and in our virtual wallets.

The latest to launch is Amazon Coins; used for app, game, and in-app purchases on Amazon’s app store.

 

But what are the advantages over standard currency? The main benefit for consumers is discounts. 100 “coins” on Amazon is equivalent to $1, whereas 500 will cost $4.80 (a 4% saving) with more gift cards...

By Ryan Daws, 14 May 2013, 0 comments. Categories: Billing, Consumers, Entertainment, Industry, Marketing, Security.

Building automation market will reach $43 billion

After years of steady but low growth, the commercial building automation systems (BAS) market is experiencing a rapid period of change and investment. Traditionally, growth and adoption has been closely tied to new building completion but new entrants and new connectivity are driving greater investment. According to the latest market study by ABI Research, over the next five years the building automation services market will grow to $43 billion -- that's up from $35 billion this year. Two key factors...

By David H. Deans, 14 May 2013, 0 comments. Categories: Devices, Infrastructure, M2M, Security.

Digital citizens need a new approach to emergency services

Every year, the world community faces a variety of natural disasters including earthquakes, fires, floods, storms, and droughts. In response to these realities, many nations have developed sophisticated emergency response capabilities. These continue to be maintained at peak levels through ongoing programs of review and reassessment. However, continuous improvement alone does not always provide sufficient answers in a changing world. Sometimes there is a need for some deeper reflection to consider the emerging needs of a...

By Ovum Research, 13 May 2013, 0 comments. Categories: Industry, Infrastructure, Mobile, Security.

Quantum internet used for two years, becoming a reality

Utilising quantum mechanics to provide perfectly secure online communication is something security experts in particular have lusted over for years – well as it turns out, a government lab has been using just that for the past two.

A team at the Los Alamos National Labs in New Mexico has developed a not quite “true” quantum internet solution, but it’s very close.

The core theology of quantum internet is through measuring the characteristic of an object such as a photon; it’s...

By Ryan Daws, 07 May 2013, 2 comments. Categories: Devices, Infrastructure, Networks, Research, Security, Telematics.

Stay safe with reliable public safety networks

The U.S. government is funding a program to improve public safety. It’s called FirstNet, which has $7B currently available to build a nationwide, public safety network using LTE.

The idea is to create a nation-wide broadband network, which helps police, firefighters, emergency medical service professionals and other public safety officials to do their job safely. In additional to federal funds, the state and local governments are contributing to this initiative. And private companies like Agile Network...

By Tellabs, 02 May 2013, 0 comments. Categories: Broadband, Infrastructure, LTE, Mobile, Security.

Which telecom providers “have your back” in data security?

The EFF (Electronic Frontier Foundation) has released its ‘Who has your back?’ report for 2013, its third edition. As a company whose tagline is “defending your rights in the digital world”, this document helps consumers understand the service providers they can trust.

 

 

Scoring is based on a star system out of a possible six:

1.            Requires a warrant for...

By Ryan Daws, 01 May 2013, 0 comments. Categories: Big Data, Consumers, Content, Industry, Networks, Operators, Security.

Cellebrite introduces diagnostics tool designed to cut down phone repairs

Mobile forensics and data transfer provider Cellebrite has launched a multi-channel diagnostics tool, claimed to be the first in the wireless retail industry.

Debuted at Mobile World Congress in Barcelona, Cellebrite estimates that the tool will reduce the overall process of phone repairs and returns by up to 60%.

The solution systematically goes through all potential faultlines in a phone, including CPU and RAM performance, storage, memory and network capability. It also comes in an app format, though...

By James Bourne, 07 March 2013, 0 comments. Categories: Big Data, Security, Smartphones.

Exploring applications for mobile phone SIM cards

Mobile phone subscriber identification module (SIM) card annual shipments are expected to rise in 2013 by 5 percent to 5.5 billion units, according to the latest market study by ABI Research. Growth is slowing as markets near saturation and the SIM card becomes increasingly ubiquitous across different mobile network technologies. However, areas of growth remain with new applications, form factors, and an increasing breadth of connected products. As such, the related market value will grow at a higher rate to...

By David H. Deans, 07 February 2013, 0 comments. Categories: Mobile, Networks, Operators, Security.

Huawei’s stock goes up and up as 2013 begins

End of year message from acting CEO reveals 2012 sales revenue in excess of $35bn (£21.8bn) and a net profit of approximately $2.4bn (£1.5bn)

It’s been an eventful 12 months for Chinese telecommunications vendor Huawei.

From becoming the largest worldwide vendor ahead of Ericsson in July, to being hauled in front of a US House Intelligence Committee for the potential use of spying codes in company equipment

By James Bourne, 07 January 2013, 1 comment. Categories: China, Operators, Security.