In the News
In February 2014, the US ambassador to Ukraine suffered an embarrassing leak. A secret conversation between him and US Assistant Secretary of State Victoria Nuland got posted to YouTube, in which Nuland spoke disparagingly about the European Union.
The global network that transfers calls between mobile phone carriers has security defects that permit hackers and governments to monitor users’ locations and eavesdrop on conversations. As more reports of these activities surface, carriers are scrambling to protect customers from a few specific types of attacks.
Facebook's WhatsApp last week announced it would roll out end-to-end encryption for its users to better protect their privacy, but the move could make the service more attractive to spammers, too.
While encryption can safeguard information from data thieves, it also can block data protectors from detecting malicious activity on their networks.
"WhatsApp's encryption policy is a win for privacy advocates, but it will not stop the growth of spam on the platform and could make the problem worse," said Simeon Coney, chief strategy officer for AdaptiveMobile.
An increasing number of telecoms and communications providers are taking an active role in providing cyber security services.
AdaptiveMobile estimates up to 80% of ‘connected’ devices do not have adequate security measures in place, with four in five devices on the market vulnerable to malicious or inadvertent attacks and data breaches
Mobile network security provider AdaptiveMobile argues that up to 80% of connected devices do not possess sufficient security requirements, with a similar proportion of devices liable to hacks and data breaches.
An excerpt from Gartner’s research report ‘Predict 2016: Security Solution’ says: “[The] security market will continue to evolve alongside new requirements from the Internet of Things, cloud computing and sophisticated targeted attacks.
A survey of over 6,000 United Kingdom residents by BullGuard has found that 72% of United Kingdom consumers would not know how to protect Internet of Things (IoT) devices. Additionally, connected smart coffee makers, batteries, light bulbs and even toothbrushes are also available. 57 per cent of consumers are also anxious about privacy breaches.
Making IoT devices work together better should be the focus of IoT development, according to Google.
AdaptiveMobile’s CTO, Ciaran Bradley, told IoB that a new security architecture is required to deal with the increasing connectivity of devices belonging to the Internet of Things.
Wearables, sensors, batteries, cool apps, great wristbands – sure, those are necessary for IoT success, but the real trick is to provision reliable, secure and private communications that Black Riders and hordes of nasty Orcs can’t intercept.
Delivering cloud architecture to protect all key services from IP to signalling, through to advanced messaging including RCS