Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, these devices are notoriously vulnerable, or worse, the security implementation is so flawed that they are counter-protective leaving the consumer with a false feeling…

5G Networks: Shaping Quality of Experience (QoE) in the 5G Era

After reigning for 8+ years as the standard for mobile broadband, 4G networks are about to be dethroned by 5G. 5G networks promise dramatically faster speeds, lower latency and massive machine to machine communications – but is this enough to ensure happy consumers? Back in 2009, 4G was launched with the promise of delivering faster…

10 Ransomware Attacks You Should Know About in 2019

Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019. The 2019 ransomware landscape is quite diverse – security researchers track over 1,100 different ransomware variants preying on innocent web users. As this…

DNS Attack on Yandex – Can It Happen to You?

Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google of Russia. The network attacks exploited vulnerabilities in the block-list system of Roskomnadzor, Russia’s state censor, that the government uses to ban sites…

Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis that reduced tens of thousands of NOC alarms to a single “parent alarm”, which highlighted…

Don’t be a Dumb Pipe! You CAN Analyze Encrypted Video Traffic

If you were to ask consumers in regulated countries what the main driver was for choosing their mobile service provider, chances are they’ll tell you that when it comes to data bundles and price, they’re all similar. So, what is most important to them?   Well here are a few hints. By 2021, 82% of…

IoT Security and the Home Consumer

  True story. All I wanted was to upgrade our home thermostat to a smart one. What did I end up with? A lecture about IoT security. Who gave me the lecture? You won’t guess—my wife! Smart and educated, my wife is well-versed in what’s going on in the world through reading newspapers and watching…

Recapping MWC 2018: Four Things We Would Like to Have Seen

Another Mobile World Congress (MWC) has come and gone. An impressive event as always, this year over 100,000 people descended on an unusually chilly Barcelona for the world’s largest exhibition for the ever-expanding mobile industry to learn about the latest trends and technologies – and to showcase the latest innovations. If one word were to…

2018 Predictions: Will Technology Deliver on its Promise in 2018?

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

Net Neutrality – Dead as a Dodo

Net neutrality is about to go the way of the Dodo Bird. Regardless of whether you are pro-Trump or anti-Trump, pro-regulation or anti-regulation, this is a huge change in how we access the internet. Will service providers favor their own services, strike deals with content providers that effectively box out smaller competitors or create a…