11 result(s) displayed for Security (1 - 11 of 11):
I just bought an Android tablet after living exclusively in the Apple iOS world for the past couple years. The cost of the cheaper Android tablet was great, and my geek side surely will enjoy the customization options in the days ahead. However, what I do not look forward to are potential security issues.
All of the reports in recent years have exposed the fact that the Android environment is more susceptible to being compromised than IoS, however, recently even that is becoming a matter of degree as cracks in the Apple armor have been exposed. The one as somebody who is in the tech industry and tries to be vigilant that should make us Android users be somewhat concerned is the Stagefright vulnerability which hopefully will not make it into the wild.
To be frank, Stagefright is pretty scary. Anyone with an Android mobile device who is vulnerable to the exploit should be thinking about it, and that’s roughly close to 1 billion devices at last count. What makes Stagefright so frightening is that it isn’t just a malware exploit that cause significant grief. In what might be considered a perverse flip side of ease-of-use, Stagefright is unfortunately about ease-of-infection. It loads itself onto an Android device with nothing more than an MMS message. A message with a carefully crafted media attachment can infect the Android device without any user intervention.
By Mae Kowalke, TMCnet Contributor
It is a scene out of a Mission Impossible movie, only the threat is real. Two product managers and a VP sit down to discuss the latest product release, one that’s been under wraps for months. While the group thinks it is safely beyond the ears of its competition, unknowingly one of those present in the meeting has had malware installed on his Android phone. The malware activates the microphone on the smartphone, and the whole meeting is taped and sent to the competition.
This nightmare scenario is unfortunately not beyond the possible these days.
Kindsight, an Alcatel-Lucent suite of solutions, leverages network-based security analytics such as its 9900 Wireless Network Guardian to reveal the latest trends on security threats to fixed and mobile networks, and its Q2 2013 Kindsight Security Labs Malware Quarterly Report reveals that the number of mobile spyware applications discovered this quarter is on the rise, according to an Alcatel-Lucent blog post, Android phones playing “I spy” at home and at work..
By Erin Harrison
“Your surveillance network should dictate your power and equipment requirements, not the other way around. Often operators tell me they want 50 cameras. I ask them what they think every one of those cameras should be doing. It’s very easy to over-engineer systems and overwhelm your ICT network with unnecessary data.”
In addressing network operators in a recent article in Alcatel-Lucent’s Tracktalk, Making the case for Enhanced Rail Security Systems, the above expert advice was provided by Dave Gorshkov, CEO of Digital Grape Business Services.
“Security is essential to the modern railway, protecting passengers, staff the operator’s assets from diverse range of risks including terrorism, crime, trespass, and vandalism,” he continued, noting that few security systems are installed without the support of a robust business case.
By Mae Kowalke
The use of video surveillance as a public safety and security tool is growing. Partially, that’s because homeland security regulations and initiatives around the world are driving deployment. It’s also because high capacity wireless data networks have brought down the cost of infrastructure to the point where the ability to provide comprehensive coverage is practical and cost-effective.
However, it should be noted that the initial investment and operation and maintenance costs of video surveillance can be significant. This is highlighted by the fact that protection responsibility is shifting from police/military to infrastructure owners.
“In the US energy market, for example, the North American Electric Reliability Corporation-Critical Infrastructure Protection regulations require that utilities tightly control access to their most important infrastructure,” notes Sheridan Nye, Senior Analyst at Informa Telecoms and Media’s Enterprise Verticals practice, in a LifeTalk article, “Is Video Surveillance Worth the Investment?”