“Provide clarification on PRISM”, says EU commissioner

The past week I’ve written two articles regarding the US Government; allegations of spying using PRISM, and calls by involved companies for more transparency as a result.

The Director of National Intelligence claims PRISM is solely for data-collection of non-US citizens; naturally, the EU’s commissioner for justice and fundamental rights, Viviane Reding, wants some clarification.

In a...

By Ryan Daws, 13 June 2013, 0 comments. Categories: Big Data, Consumers, Europe, Government, Industry, N America, Networks, Operators, Security.

Facebook, Twitter join Google’s call for surveillance transparency

The US Government has been under heavy-fire recently over leaked documents such as PRISM; showing the extent of potentially unwarranted surveillance operations. Companies including Google, Facebook, and Twitter were all pulled into question; now they’re calling for transparency...

At first glance many would think “convenient timing” but, in fairness to those involved, many have taken steps previously for their relevant company to be totally open...

By Ryan Daws, 12 June 2013, 0 comments. Categories: Big Data, Consumers, Google, Government, Industry, Security.

PRISM: The dark side of the US government?

The internet is in uproar over the US government monitoring citizens and international users through a “direct access” backdoor to the biggest companies, using a program codenamed PRISM.

Born out of the “Protect America Act” approved by Congress in 2007, the legislation allows warrantless interception of foreign-to-foreign communications. Created with the aim to protect from foreign threats; not monitor citizens.

Supposedly the system has instantaneous access to companies including...

By Ryan Daws, 07 June 2013, 0 comments. Categories: Consumers, Government, Industry, N America, Networks, Operators, Security.

Chinese hackers breach Google to reveal US spy data

Chinese hackers gained access to “years worth of US law enforcement and spy data” in a breach of Google’s servers back in 2010, according to a report.

Official response from Google at the time said the hackers were after “human rights activist information”, where in fact US officials actually say they were after a sensitive database.

At the time a dispute was raised between Google and the FBI stemming from distrust for making no reference to the possible hacked database.

It now...

By Ryan Daws, 21 May 2013, 0 comments. Categories: China, Google, Security.

Emerging Threats combats millions of new malware a week

There are 250,000 plus new pieces of malware being produced each day equating to one piece per person in the US in just over three and a half years. The question is, what do you do with this onslaught of algorithms which are written with malicious intent in mind? One company, Emerging Threats thinks they can help with part of the equation… Identification of the sites which are compromised.

I recently met with the company at Interop in Las Vegas to learn about their IP and domain...

By Rich Tehrani, 21 May 2013, 0 comments. Categories: Big Data, Infographic, Security.

Virtual Coins – what will this mean for the payments space?

Forget £, $, €, or the whole host of other international currencies, the new kid on the block is virtual currencies; which live on the web and in our virtual wallets.

The latest to launch is Amazon Coins; used for app, game, and in-app purchases on Amazon’s app store.

 

But what are the advantages over standard currency? The main benefit for consumers is discounts. 100 “coins” on Amazon is equivalent to $1, whereas 500 will cost $4.80 (a 4% saving) with more gift cards...

By Ryan Daws, 14 May 2013, 0 comments. Categories: Billing, Consumers, Entertainment, Industry, Marketing, Security.

Building automation market will reach $43 billion

After years of steady but low growth, the commercial building automation systems (BAS) market is experiencing a rapid period of change and investment. Traditionally, growth and adoption has been closely tied to new building completion but new entrants and new connectivity are driving greater investment. According to the latest market study by ABI Research, over the next five years the building automation services market will grow to $43 billion -- that's up from $35 billion this year. Two key factors...

By David H. Deans, 14 May 2013, 0 comments. Categories: Devices, Infrastructure, M2M, Security.

Digital citizens need a new approach to emergency services

Every year, the world community faces a variety of natural disasters including earthquakes, fires, floods, storms, and droughts. In response to these realities, many nations have developed sophisticated emergency response capabilities. These continue to be maintained at peak levels through ongoing programs of review and reassessment. However, continuous improvement alone does not always provide sufficient answers in a changing world. Sometimes there is a need for some deeper reflection to consider the emerging needs of a...

By Ovum Research, 13 May 2013, 0 comments. Categories: Industry, Infrastructure, Mobile, Security.

Quantum internet used for two years, becoming a reality

Utilising quantum mechanics to provide perfectly secure online communication is something security experts in particular have lusted over for years – well as it turns out, a government lab has been using just that for the past two.

A team at the Los Alamos National Labs in New Mexico has developed a not quite “true” quantum internet solution, but it’s very close.

The core theology of quantum internet is through measuring the characteristic of an object such as a photon; it’s...

By Ryan Daws, 07 May 2013, 2 comments. Categories: Devices, Infrastructure, Networks, Research, Security, Telematics.

Stay safe with reliable public safety networks

The U.S. government is funding a program to improve public safety. It’s called FirstNet, which has $7B currently available to build a nationwide, public safety network using LTE.

The idea is to create a nation-wide broadband network, which helps police, firefighters, emergency medical service professionals and other public safety officials to do their job safely. In additional to federal funds, the state and local governments are contributing to this initiative. And private companies like Agile Network...

By Tellabs, 02 May 2013, 0 comments. Categories: Broadband, Infrastructure, LTE, Mobile, Security.

Which telecom providers “have your back” in data security?

The EFF (Electronic Frontier Foundation) has released its ‘Who has your back?’ report for 2013, its third edition. As a company whose tagline is “defending your rights in the digital world”, this document helps consumers understand the service providers they can trust.

 

 

Scoring is based on a star system out of a possible six:

1.            Requires a warrant for...

By Ryan Daws, 01 May 2013, 0 comments. Categories: Big Data, Consumers, Content, Industry, Networks, Operators, Security.

Cellebrite introduces diagnostics tool designed to cut down phone repairs

Mobile forensics and data transfer provider Cellebrite has launched a multi-channel diagnostics tool, claimed to be the first in the wireless retail industry.

Debuted at Mobile World Congress in Barcelona, Cellebrite estimates that the tool will reduce the overall process of phone repairs and returns by up to 60%.

The solution systematically goes through all potential faultlines in a phone, including CPU and RAM performance, storage, memory and network capability. It also comes in an app format, though...

By James Bourne, 07 March 2013, 0 comments. Categories: Big Data, Security, Smartphones.

Exploring applications for mobile phone SIM cards

Mobile phone subscriber identification module (SIM) card annual shipments are expected to rise in 2013 by 5 percent to 5.5 billion units, according to the latest market study by ABI Research. Growth is slowing as markets near saturation and the SIM card becomes increasingly ubiquitous across different mobile network technologies. However, areas of growth remain with new applications, form factors, and an increasing breadth of connected products. As such, the related market value will grow at a higher rate to...

By David H. Deans, 07 February 2013, 0 comments. Categories: Mobile, Networks, Operators, Security.

Huawei’s stock goes up and up as 2013 begins

End of year message from acting CEO reveals 2012 sales revenue in excess of $35bn (£21.8bn) and a net profit of approximately $2.4bn (£1.5bn)

It’s been an eventful 12 months for Chinese telecommunications vendor Huawei.

From becoming the largest worldwide vendor ahead of Ericsson in July, to being hauled in front of a US House Intelligence Committee for the potential use of spying codes in company equipment

By James Bourne, 07 January 2013, 1 comment. Categories: China, Operators, Security.

Does ReVuln research show security worries for Smart TVs?

A video posted by Malta-based security firm ReVuln has shown potential security weaknesses in an unspecified Samsung Smart TV.

Rather chillingly titled ‘The TV is Watching You’, the video shows the researchers tampering with TV settings and channel lists, firmware and USB drives among other things which gives them “root” access to the smart TV – in other words, total control of it.

Worryingly, the researchers also found they could hack through the remote control if it’s...

By James Bourne, 17 December 2012, 0 comments. Categories: IPTV, Research, Security, Smart TV.

Are foreign regulators discriminating against Huawei?

In the week that Huawei and ZTE denies being a threat to US national security, is it fair to say that Huawei is being discriminated against by overseas regulatory bodies?

According to Huawei’s Australia chairman John Lord, there were elements of disappointment and obfuscation when the Australian government banned the Chinese vendor from their $40bn+ NBN (National Broadband Network) in March this year.

Lord informed an Australian parliamentary intelligence committee of his worry that this would set a...

By James Bourne, 14 September 2012, 0 comments. Categories: China, Operators, Security.

Cyber activity is keeping the CISO awake at night

By Andrew Kellett, Principal Analyst, Security

Summary

The most worrying issue for C-level security professionals, and the thing that often keeps them awake at night, is the fear of the unknown.

The chief information security officer (CISO) is the person in direct line of fire when security breaches occur, and given the deteriorating state of information security, taking overall responsibility for security-related issues is a perilous role.

During the last 12 months several leading organisations have admitted...

By Ovum Research, 12 July 2012, 0 comments. Categories: Big Data, Security.

Google Apps for Business clears ISO security audit

Google Apps for Business has cleared a key security hurdle by achieving ISO 27001 certification, which it hopes will persuade large businesses that it’s safe to move crucial data and processes to its cloud.

The award was announced on Google’s blog this week by Eran Feigenbaum, Google’s enterprise director of security.

Instead of being a barrier, security is now becoming a reason that businesses switch to the cloud, he wrote. “The reason for this shift is that businesses are beginning...

By Matt Henkes, 30 May 2012, 0 comments. Categories: Apps, Google, Security.

How mobility is challenging IT departments

As mobile devices and applications extend the boundaries of the workplace, IT departments must create new policies and procedures to keep the mobile enterprise accessible, available and secure, according to new research from CompTIA. 

While PCs continue to be a major part of the corporate IT landscape, CompTIA’s new study, “Trends in Enterprise Mobility,” reveals that laptops, ultrabooks, smartphones and tablets increasingly are essential to day-to-day business.

The CompTIA study...

By TotalTelecom, 07 March 2012, 0 comments. Categories: Industry, Mobile, Security.

If Government IT requirements are not driving the tech train, what can be done?

Not too long ago, the government drove the information technology (IT) narrative for computing and telecommunicaitons.  There are many examples:

  • Lease and use of the Hollerith punchcard system for the Cenus of the United States of America. This legitimized the use of technology to improve business activities.
  • The “first” all-electronic computer (albeit without stored programs) the ENIAC. Funded by the government to speed ballistics calculations.  This mainstreamed the idea of digital computation
  • The purchase of the first Univac computer for the US Census Bureau (one...

By Wesley Kaplow, 12 December 2011, 0 comments. Categories: Government, Security.