Rich Tehrani : Communications and Technology Blog -
Rich Tehrani
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space


Is Yahoo the Preferred E-Mail of Terrorists?

October 4, 2016

Some weird news is coming out about Yahoo! secretly providing the FBI and NSA with information about users who utilize certain phrases in their emails. This would make a lot of sense from a security standpoint but obviously destroys everyone's privacy as innocent civilians become targets of snooping. This is the case because you need to scan all emails to find the ones which match your criteria.

The news is weird because it doesn't make sense to just have one email provider scan their communications - naturally Microsoft and Google as well as others would have to do the same.

Cybersecurity and the Terrible, Horrible, No Good, Very Bad Week

September 25, 2016

There are perhaps four major cybersecurity incidents in my mind which are world-changing. The first is the OPM data breach which allowed China to get the most intimate secrets of virtually all federal employees – tens of millions of them. As I’ve described – this information, which is super top-secret and consists of sexual history could be used to blackmail U.S. workers.

President Obama, After $400 Million, Where are Those Criminal Iranian Hackers ?

August 5, 2016

Why did we ship a fortune to our mortal enemy and not get the indicted cybercriminals living in Iran who attacked us, in return?

The U.S. is in a cyberwar. It's common knowledge.

The New Threat: Drones Attacking Industrial Systems

August 5, 2016

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior Principal Tech Specialist Jeff Melrose explained there are numerous drone-related problems to be concerned about:

  1. They can be used to block sensors in factories such as those monitoring temperature.
  2. They can block radio signals using a jammer or similar device making a factory and IoT devices unable to communicate or perhaps communicate erratically.
  3. They can be used to trail a vehicle at up to 25 MPH.
  4. They can infiltrate computer networks – attacking WiFi as well as bluetooth mice and keyboards to get into a network.


In addition, the Marines have a drone which can best be described as a mini-tank, capable of firing guns and launching grenades. It comes in two sizes – the large one can potentially fire 3,000 rounds per minute!

The Opportunities of the Dark Web

May 13, 2016

What I learned from the first-ever dark web event.

Yesterday, we held the world’s first Dark Web conference called Inside Dark Web – with partners Bob Miko and Alan Meckler. When we first decided to launch the event we discussed the business opportunities the dark web presents. After the event, there are a few observations I’ve made that I think are worth sharing.

Inside Dark Web Live Blog 2016

May 11, 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the stage here at the Inside Dark Web Conference.

The most dangerous criminals on the Dark Web are states. Hackers sponsored by Russia attacked Ukraine in the past. It is also a matter of time before a rogue state or bad actor takes out critical infrastructure in the US.

A Million Dark Web Facebook Users Value Privacy, Security and Safety

April 25, 2016

Each month, over one million people access Facebook over the dark web via Tor. So why does Facebook offer such a site and why would people even want to use it? The company says the primary drivers of this growth are privacy, security and safety.

According to Alec Muffet of Facebook:

This is why in the last two years we built the Facebook onion site and onion-mobile site, helped standardise the “.onion” domain name, and implemented Tor connectivity for our Android mobile app by enabling connections through Orbot.

He continued:

Over this period the number of people who access Facebook over Tor has increased.

Sonus Says Dial Plans Are A hot Product These Days

March 13, 2016

I just had a fascinating conversation with Sonus – they company responsible in-part for getting carriers to adopt IP communications is now seeing something very interesting happen. The company’s PSX or Centralized Routing and Policy Server is gaining interest among customers. The reason? They are looking to integrate their disparate IP communications systems together into a unified solution.

Inside Dark Web Conference: Why TMC Teamed with Alan Meckler

March 9, 2016


Alan Meckler is one of the brightest visionaries in the tech world having launched the first show covering the Internet in the 1990s – Internet World, part of Mecklermedia. He was underestimated and denigrated by virtually all the traditional tech publishers and trade show producers at the time, yet his event grew faster than any show I have ever seen.

I attended many of these conferences in New York and Los Angeles and saw with my own eyes how professionally run and vibrant these fast-growing shows were.

State of the IoT Market: Kore, Polaris, Cradlepoint

February 10, 2016

Cradlepoint talks scaling IoT at IoT Evolution Expo

At the most recent IoT Evolution Expo in Fort Lauderdale, Florida, we had a chance to interview a number of the companies shaping the future of the IoT space. Cradlepoint (below) for example had a lot of exciting news to share such as the company's recent SDN acquisition and how this relates to keeping IoT devices secure and scaling properly.

Gemalto too had some great news to share - their secure IoT solutions are doing well in the market thanks to mainstream hacking publicity. He went on to detail various threats companies need to keep in mind - after a risk assessment they work backwards from.

If there was a trend, it was optimism... Here is the complete list of IoT companies interviewed:

Azul Systems Clear2there Cradlepoint Droplit Encore Networks Exosite Gemalto Inmarsat Intertek Kore LocusTraxx My Devices Polaris SECO Webee

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 66 Next
Featured Events