Category: Security

Sponsored By:

Web inventor slams FCC for privacy violations

Sir Tim Berners-Lee has hit out at the US government and FCC following the decision to repeal ISP privacy rules which were put in place to provide some level of control for the consumer.

The Telecoms.com Podcast: capitulation, acceleration and observation

In the first podcast of the post-Skinner era, the team is joined by super-sub Iain Morris from Light Reading. Among the key conversation-points of the week include BT finally caving in to Ofcom’s demands for the ‘legal separation’ of Openreach – whatever that means. The guys also mull over the pros and cons of accelerating 5G NR by itself and reflect on the apparent ability of the CIA to hack our devices in order to keep an eye on us.

WikiLeaks exposes Internet of Spooks

Who is the CIA’s favourite author? You guessed it, George Orwell. At least that’s what its apparent fondness for TVs as surveillance devices leads us to conclude.

What to watch out for at MWC 2017

The new CSP as a data-driven platform business, intelligent automation, Security, Connected Home, 5G and Mixed Reality are the Stories to Watch for Mobile World Congress 2017.

Mobile app fraud: how to fight back to protect against risk

With the rise of app-install products offered by leading advertising platforms such as Facebook, Twitter, Google, Instagram and Snapchat, smartphones today are a much more appealing target for potential fraud than ever before.

WhatsApp faces another privacy PR disaster

WhatsApp has picked up in 2017 where it finished in 2016 fighting another potential PR disaster as researchers claim there is a security backdoor to its encryption.

2017 Predictions: What the industry thinks

While 2016 proved to be a solid year for incremental advancements in 5G, IoT and cloud computing, 2017 is set to be a big year for a number of breakthrough technologies.

Data Revelations: Nominum Data Science Security Report

This inaugural security report from Nominum Data Science comes from the frontlines of the war against cybercrime, examining the most prevalent and effective malware in today’s threat landscape—including DDoS, DNS amplification and pseudo-random subdomain (PRSD) attacks. Nominum Data Science reveals the methods and mechanics behind emerging and pervasive threats, such as Locky, Necurs and Ghost Push. The team analyzes over 100 billion DNS queries every day and employs advanced techniques, including proprietary algorithms and machine learning, to give you the best insight into today’s dynamic threat landscape.

Polls

Should privacy be treated as a right to protect stringently, or a commodity for users to trade for benefits?

Loading ... Loading ...