January 6, 2023
Via: Help Net SecurityKeysight Technologies has collaborated with Qualcomm Technologies to establish an end-to-end 5G non-terrestrial network (NTN) connection. Based on this successful demonstration of call signaling and data transfer using orbit trajectory emulation, Keysight and Qualcomm Technologies aim to accelerate 5G NTN […]
September 27, 2021
Via: Help Net SecurityThough in early stages, 5G will be adopted considerably faster than 4G based on the current rate experienced in China and South Korea. However, even with faster adoption rates of 5G, 4G will remain the more prevalent cellular technology through […]
Editorial, Network security, Security
April 18, 2019
Via: Sofia AllendeIn the past decades, the telecommunications industry has seen massive changes. We’ve gone from first mobile phone to 4G LTE, and we’re now getting ready to enter a new era of intelligent connectivity, the era of 5G networks. What is […]
June 6, 2018
Via: TechRadarThe European Union has agreed to a series of updates to the European Communications Code (ECC) which it claims will help improve connectivity across the continent and fulfill the ambitions of the European Digital Single market. However, the new regulations, […]
Mobile security, Network security
March 2, 2017
Via: Naked SecurityIt’s noticeable how many vendors are pushing the IoT security message, including names such as F5 Networks, which many would not immediately associate with this competence. In the wake of high-profile recent attacks, vendors such are clearly pushing the vulnerability […]
Network security, Virus & Malware
February 22, 2017
Via: Radware BlogAs organizations continue to embrace the digital evolution, a growing number of assets are being connected to the Internet. In fact, most organizations are now using—if not relying on—cloud-based applications to power operations. With this shift, IT infrastructures have become […]
January 19, 2017
Via: Dark ReadingIn the brave new world of cloud, security teams must be as agile as possible. This means leveraging proactive monitoring tools, locking down access points, and forecasting requirements In the cloud – just as in the physical world – the […]
December 6, 2016
Via: Dark ReadingThe Department of Homeland Security is fully justified in urging security standards for the Internet of Things. In an effort to curtail a new and disturbing cyber-attack trend, the Department of Homeland Security has placed Internet of Things (IoT) device […]
November 18, 2016
Via: Symantec ConnectRecent variants of Android.Fakebank.B have been updated to work around the battery-saving process Doze. The variants display a pop-up message asking the user to add the threat to the Battery Optimizations exceptions whitelist. If this technique works, then the malware […]
October 10, 2016
Via: Panda SecurityThe tablets or smartphones at your office connect to either 3G or 4G (which is better than WiFi). When tablets and other connected devices (like smartphones or smartwatches) become essential to an employee’s work, then it is imperative that these […]
Application security, Privacy protection
September 29, 2016
Via: Kaspersky BlogOn August 25, WhatsApp published a blog post detailing its new terms of use. These types of posts rarely generate buzz, but this post detailed end-to-end encryption, exploration of business, and connecting your phone number with Facebook’s systems. Hang on. […]
Application security, Mobile security
September 23, 2016
Via: CSO OnlineU.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate […]
August 12, 2016
Via: TrendMicro BlogIn many ways, the internet has made the world smaller. Communication between people on different continents is now instantaneous. Files and information can be rapidly shared between disparate web users, and edited in real time. Events that occur on one […]
Application security, Privacy protection
August 1, 2016
Via: Help Net SecurityThere’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of choice represents only a small fraction of what’s […]
June 21, 2016
Via: Security IntelligenceAre you a part of the always-on workforce? As it turns out, a large percentage of us are. Long gone are the 9-to-5 workdays confined to our office cubicles. Often we find ourselves working on the go and looking for […]
May 18, 2016
Via: Security IntelligenceThe Internet of Things (IoT) means adding network connectivity and some form of “intelligence” to everything. Everyday items are now connected to each other and the Internet. We are seeing an accelerating trend of smart devices flooding personal spaces, creating […]
March 30, 2016
Via: Help Net SecurityThe Internet of Things (IoT) and subsequent explosion of connected devices have created a world of opportunities we might never have anticipated. But have these new capabilities and associated connectivity come at the expense of security? We often hear how […]
March 11, 2016
Via: TrendMicro BlogAttracting the best and brightest in the field, the annual RSA Conference plays an important role in keeping security professionals across the globe connected and educated. Last week, we witnessed several cyber-security trends and developments including the federal government’s involvement […]
September 15, 2015
Via: wireless-securityWhile traditional #manufacturing industries were not designed with security in mind, the proliferation of networks and devices, disparate communication channels, and the use of off-the-shelf software have thrust cyber-security into the spotlight. #safety and security concerns associated with the high […]