Quantum internet used for two years, becoming a reality

Utilising quantum mechanics to provide perfectly secure online communication is something security experts in particular have lusted over for years – well as it turns out, a government lab has been using just that for the past two.

A team at the Los Alamos National Labs in New Mexico has developed a not quite “true” quantum internet solution, but it’s very close.

The core theology of quantum internet is through measuring the characteristic of an object such as a photon; it’s...

By Ryan Daws, 07 May 2013, 2 comments. Categories: Devices, Infrastructure, Networks, Research, Security, Telematics.

Stay safe with reliable public safety networks

The U.S. government is funding a program to improve public safety. It’s called FirstNet, which has $7B currently available to build a nationwide, public safety network using LTE.

The idea is to create a nation-wide broadband network, which helps police, firefighters, emergency medical service professionals and other public safety officials to do their job safely. In additional to federal funds, the state and local governments are contributing to this initiative. And private companies like Agile Network...

By Tellabs, 02 May 2013, 0 comments. Categories: Broadband, Infrastructure, LTE, Mobile, Security.

Which telecom providers “have your back” in data security?

The EFF (Electronic Frontier Foundation) has released its ‘Who has your back?’ report for 2013, its third edition. As a company whose tagline is “defending your rights in the digital world”, this document helps consumers understand the service providers they can trust.

 

 

Scoring is based on a star system out of a possible six:

1.            Requires a warrant for...

By Ryan Daws, 01 May 2013, 0 comments. Categories: Big Data, Consumers, Content, Industry, Networks, Operators, Security.

Cellebrite introduces diagnostics tool designed to cut down phone repairs

Mobile forensics and data transfer provider Cellebrite has launched a multi-channel diagnostics tool, claimed to be the first in the wireless retail industry.

Debuted at Mobile World Congress in Barcelona, Cellebrite estimates that the tool will reduce the overall process of phone repairs and returns by up to 60%.

The solution systematically goes through all potential faultlines in a phone, including CPU and RAM performance, storage, memory and network capability. It also comes in an app format, though...

By James Bourne, 07 March 2013, 0 comments. Categories: Big Data, Security, Smartphones.

Exploring applications for mobile phone SIM cards

Mobile phone subscriber identification module (SIM) card annual shipments are expected to rise in 2013 by 5 percent to 5.5 billion units, according to the latest market study by ABI Research. Growth is slowing as markets near saturation and the SIM card becomes increasingly ubiquitous across different mobile network technologies. However, areas of growth remain with new applications, form factors, and an increasing breadth of connected products. As such, the related market value will grow at a higher rate to...

By David H. Deans, 07 February 2013, 0 comments. Categories: Mobile, Networks, Operators, Security.

Huawei’s stock goes up and up as 2013 begins

End of year message from acting CEO reveals 2012 sales revenue in excess of $35bn (£21.8bn) and a net profit of approximately $2.4bn (£1.5bn)

It’s been an eventful 12 months for Chinese telecommunications vendor Huawei.

From becoming the largest worldwide vendor ahead of Ericsson in July, to being hauled in front of a US House Intelligence Committee for the potential use of spying codes in company equipment

By James Bourne, 07 January 2013, 1 comment. Categories: China, Operators, Security.

Does ReVuln research show security worries for Smart TVs?

A video posted by Malta-based security firm ReVuln has shown potential security weaknesses in an unspecified Samsung Smart TV.

Rather chillingly titled ‘The TV is Watching You’, the video shows the researchers tampering with TV settings and channel lists, firmware and USB drives among other things which gives them “root” access to the smart TV – in other words, total control of it.

Worryingly, the researchers also found they could hack through the remote control if it’s...

By James Bourne, 17 December 2012, 0 comments. Categories: IPTV, Research, Security, Smart TV.

Are foreign regulators discriminating against Huawei?

In the week that Huawei and ZTE denies being a threat to US national security, is it fair to say that Huawei is being discriminated against by overseas regulatory bodies?

According to Huawei’s Australia chairman John Lord, there were elements of disappointment and obfuscation when the Australian government banned the Chinese vendor from their $40bn+ NBN (National Broadband Network) in March this year.

Lord informed an Australian parliamentary intelligence committee of his worry that this would set a...

By James Bourne, 14 September 2012, 0 comments. Categories: China, Operators, Security.

Cyber activity is keeping the CISO awake at night

By Andrew Kellett, Principal Analyst, Security

Summary

The most worrying issue for C-level security professionals, and the thing that often keeps them awake at night, is the fear of the unknown.

The chief information security officer (CISO) is the person in direct line of fire when security breaches occur, and given the deteriorating state of information security, taking overall responsibility for security-related issues is a perilous role.

During the last 12 months several leading organisations have admitted...

By Ovum Research, 12 July 2012, 0 comments. Categories: Big Data, Security.

Google Apps for Business clears ISO security audit

Google Apps for Business has cleared a key security hurdle by achieving ISO 27001 certification, which it hopes will persuade large businesses that it’s safe to move crucial data and processes to its cloud.

The award was announced on Google’s blog this week by Eran Feigenbaum, Google’s enterprise director of security.

Instead of being a barrier, security is now becoming a reason that businesses switch to the cloud, he wrote. “The reason for this shift is that businesses are beginning...

By Matt Henkes, 30 May 2012, 0 comments. Categories: Apps, Google, Security.