Time for Service Providers to Become “Masters of Security”

US Government Acting against Cybersecurity Threats.  While palming off incidences of Fake News like they were annoying bugs, US President Trump is taking cyber-attack threats much more seriously. On May 11, 2017, the President issued Executive Order 13800, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure”. The US Department of Commerce, Homeland Security Release…

BadRabbit: Is Three the Magic Number, or is this The New Normal?

Did you know that the damages from Ransomware are expected to be more than $5 billion by the year 2020? This is not just the cost of paying the ransom itself, but also the price of destruction and loss of data, the downtime involved getting systems back online, and the disruption to the business which…

An immediate opportunity for CSP’s to increase IoT revenue

IoT devices are expected to exceed mobile phones as the largest category of connected devices in 2018, giving shrewd mobile operators a lot to benefit from. Unlike smartphones whose appetite for data grows every year, IoT devices such as those used to monitor the health of a car engine or for billing water or electricity…

What to Expect at MWC Americas: IoT Takes the Stage

This year, for the very first time, the wireless technologies trade association CTIA will be combining forces with the GSMA, for their Mobile World Congress Americas 2017. The conference looks set to emphasize core communications and mobile technologies, as well as consumer and industrial applications to the Internet of Things (IoT).  We’re looking forward to…

Be the Cyber Knight in Shining Armor: Protect Your Subscribers From Cyber Bullies

As anonymized messaging apps top the download charts, their popularity raises the increasingly serious issue of cyberbullying.  Communication service providers, network owners and operators that are conscious of this issue can play a significant role in protecting vulnerable users and strengthen their position as more than just “pipe providers”. So how can you become the…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

“Ignorance is Bliss” No Longer an Option When It Comes to Mobile Security for consumers

It is an accepted fact that, since the beginning of this decade, cyber-attacks on mobile devices have been growing rapidly, with no signs of slowing down. In fact the prevalence of Mobile-malware designed to infect smartphone operating systems and applications, grew over 300% in 2016. And yet, in the mindset of the consumer, attacks on…

1 2