Securely Mapping Africa’s Digital Future

The latest cyber-security proposals and guidelines for Africa have proven the need for a unified security strategy across both the public and the private sector, with this being shown across multiple regions, networks and industries. As one of the largest growth areas in the world, the guidelines make a point of discussing how integral it…

An immediate opportunity for CSP’s to increase IoT revenue

IoT devices are expected to exceed mobile phones as the largest category of connected devices in 2018, giving shrewd mobile operators a lot to benefit from. Unlike smartphones whose appetite for data grows every year, IoT devices such as those used to monitor the health of a car engine or for billing water or electricity…

Winding Down From Mobile World Congress 2017: Security and Usability

It’s been a non-stop week at Mobile World Congress Americas 2017. With dozens of business cards in our pockets, and our feet and jaws aching from three days on the floor, let’s look back on some of the highlights, and our favorite speakers and thoughts from the inaugural event. Marcelo Claure “Security will be the…

What to Expect at MWC Americas: IoT Takes the Stage

This year, for the very first time, the wireless technologies trade association CTIA will be combining forces with the GSMA, for their Mobile World Congress Americas 2017. The conference looks set to emphasize core communications and mobile technologies, as well as consumer and industrial applications to the Internet of Things (IoT).  We’re looking forward to…

Be the Cyber Knight in Shining Armor: Protect Your Subscribers From Cyber Bullies

As anonymized messaging apps top the download charts, their popularity raises the increasingly serious issue of cyberbullying.  Communication service providers, network owners and operators that are conscious of this issue can play a significant role in protecting vulnerable users and strengthen their position as more than just “pipe providers”. So how can you become the…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

1 2