Cellebrite introduces diagnostics tool designed to cut down phone repairs

Mobile forensics and data transfer provider Cellebrite has launched a multi-channel diagnostics tool, claimed to be the first in the wireless retail industry.

Debuted at Mobile World Congress in Barcelona, Cellebrite estimates that the tool will reduce the overall process of phone repairs and returns by up to 60%.

The solution systematically goes through all potential faultlines in a phone, including CPU and RAM performance, storage, memory and network capability. It also comes in an app format, though...

By James Bourne, 07 March 2013, 0 comments. Categories: Big Data, Security, Smartphones.

Exploring applications for mobile phone SIM cards

Mobile phone subscriber identification module (SIM) card annual shipments are expected to rise in 2013 by 5 percent to 5.5 billion units, according to the latest market study by ABI Research. Growth is slowing as markets near saturation and the SIM card becomes increasingly ubiquitous across different mobile network technologies. However, areas of growth remain with new applications, form factors, and an increasing breadth of connected products. As such, the related market value will grow at a higher rate to...

By David H. Deans, 07 February 2013, 0 comments. Categories: Mobile, Networks, Operators, Security.

Huawei’s stock goes up and up as 2013 begins

End of year message from acting CEO reveals 2012 sales revenue in excess of $35bn (£21.8bn) and a net profit of approximately $2.4bn (£1.5bn)

It’s been an eventful 12 months for Chinese telecommunications vendor Huawei.

From becoming the largest worldwide vendor ahead of Ericsson in July, to being hauled in front of a US House Intelligence Committee for the potential use of spying codes in company equipment

By James Bourne, 07 January 2013, 1 comment. Categories: China, Operators, Security.

Does ReVuln research show security worries for Smart TVs?

A video posted by Malta-based security firm ReVuln has shown potential security weaknesses in an unspecified Samsung Smart TV.

Rather chillingly titled ‘The TV is Watching You’, the video shows the researchers tampering with TV settings and channel lists, firmware and USB drives among other things which gives them “root” access to the smart TV – in other words, total control of it.

Worryingly, the researchers also found they could hack through the remote control if it’s...

By James Bourne, 17 December 2012, 0 comments. Categories: IPTV, Research, Security, Smart TV.

Are foreign regulators discriminating against Huawei?

In the week that Huawei and ZTE denies being a threat to US national security, is it fair to say that Huawei is being discriminated against by overseas regulatory bodies?

According to Huawei’s Australia chairman John Lord, there were elements of disappointment and obfuscation when the Australian government banned the Chinese vendor from their $40bn+ NBN (National Broadband Network) in March this year.

Lord informed an Australian parliamentary intelligence committee of his worry that this would set a...

By James Bourne, 14 September 2012, 0 comments. Categories: China, Operators, Security.

Cyber activity is keeping the CISO awake at night

By Andrew Kellett, Principal Analyst, Security

Summary

The most worrying issue for C-level security professionals, and the thing that often keeps them awake at night, is the fear of the unknown.

The chief information security officer (CISO) is the person in direct line of fire when security breaches occur, and given the deteriorating state of information security, taking overall responsibility for security-related issues is a perilous role.

During the last 12 months several leading organisations have admitted...

By Ovum Research, 12 July 2012, 0 comments. Categories: Big Data, Security.

Google Apps for Business clears ISO security audit

Google Apps for Business has cleared a key security hurdle by achieving ISO 27001 certification, which it hopes will persuade large businesses that it’s safe to move crucial data and processes to its cloud.

The award was announced on Google’s blog this week by Eran Feigenbaum, Google’s enterprise director of security.

Instead of being a barrier, security is now becoming a reason that businesses switch to the cloud, he wrote. “The reason for this shift is that businesses are beginning...

By Matt Henkes, 30 May 2012, 0 comments. Categories: Apps, Google, Security.

How mobility is challenging IT departments

As mobile devices and applications extend the boundaries of the workplace, IT departments must create new policies and procedures to keep the mobile enterprise accessible, available and secure, according to new research from CompTIA. 

While PCs continue to be a major part of the corporate IT landscape, CompTIA’s new study, “Trends in Enterprise Mobility,” reveals that laptops, ultrabooks, smartphones and tablets increasingly are essential to day-to-day business.

The CompTIA study...

By TotalTelecom, 07 March 2012, 0 comments. Categories: Industry, Mobile, Security.

If Government IT requirements are not driving the tech train, what can be done?

Not too long ago, the government drove the information technology (IT) narrative for computing and telecommunicaitons.  There are many examples:

  • Lease and use of the Hollerith punchcard system for the Cenus of the United States of America. This legitimized the use of technology to improve business activities.
  • The “first” all-electronic computer (albeit without stored programs) the ENIAC. Funded by the government to speed ballistics calculations.  This mainstreamed the idea of digital computation
  • The purchase of the first Univac computer for the US Census Bureau (one...

By Wesley Kaplow, 12 December 2011, 0 comments. Categories: Government, Security.

Lack of collaboration leaves IT open to hackers

Pressure to improve business productivity and a lack of collaboration with different business divisions is leaving also enterprise IT departments open to increased security risks, according to a new report.

The annual ‘State of Endpoint’ study, carried out by the Poneman Institute for endpoint management and security specialist Lumension, found that the number of companies that felt their IT networks were not more secure than a year ago has increased over the past two years to just under two...

By Matt Henkes, 17 November 2011, 0 comments. Categories: Cloud, Industry, Research, Security, Smartphones.