Find out where we’re trending in the industry.
The Challenges and Future of SMS TechnologyDecember 11, 2013
WIRED | The humble text message has been enjoying a lot of attention in the mainstream press this year. The statistics have been examined from every conceivable angle – slowing growth in peer-to-peer SMS has been contrasted with explosive growth of so-called over-the-top (OTT) services like WhatsApp, leading to declining mobile operator revenues. The growth of enterprise uses of SMS such as two-factor authentication set against the migration of traditional promotional mobile messaging to channels such as Twitter. And doubtless just as SMS officially “comes of age” and turns 21 years old this month, there will be a fresh chorus of predictions for its immediate demise. If this technology really is so long in the tooth, then why does it still command so much ink?
The 10 Worst Data Breaches of 2013December 9, 2013
IT Business Edge | The scariest data breaches are the ones that companies don’t even know are happening or aren’t disclosing. In January, The New York Times revealed that its computers were stealthily compromised by Chinese hackers for a period of four months. According to a New York Times article: The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.
Security Landscape in 2014: 11 Predictions From the ExpertsDecember 5, 2013
eWEEK | Like networking, security is one of the IT components that affects every part of an IT system, ranging from a sensor or automated machine or a human user of a device to the heart of a huge enterprise data center. Everybody who uses IT of any type has to be aware of and plan for security, especially in the hyper-connected world we share. We've come a long way from the early days of the Internet, in which most people used short, simple and easy-to-remember passwords to log in to online services, to present day, in which double- and triple-factor authentication and end-to-end encryption is common. Trends in security for 2014 include more wearable computers, an increase in Near-Field Communication (NFC) opportunities and more connected homes—which, as one of our sources claims, will bring a new measure of "creepiness" into our lives. This eWEEK slide show features perspectives from Grayson Milbourne, Webroot director of security intelligence; Jim Ivers, chief security strategist at Covata; and TeleSign CTO Charles McColgan.
Transactis Deal Adds Mobile User DataDecember 2, 2013
Daily Research News Online | UK-based consumer insight and database marketing company Transactis has announced a partnership with California’s TeleSign, whose PhoneID suite helps detect suspicious mobile phone users. Transactis combines data from multiple sources to help clients understand individual consumer behaviour, and identify risks and opportunities - and says adding PhoneID’s ‘actionable data on any mobile phone number’ into its portfolio will help clients fight fraud. PhoneID Live determines phone type, mobile carrier and phone status in real time; whether a mobile phone is active and reachable; and geographic information, roaming status and roaming country.
Dreamforce 2013: Salesforce Promises Tougher SecurityNovember 19, 2013
Computing | Salesforce is taking security on its platform more seriously than ever, with a number of upgrades to its existing two-factor authentication on the horizon, a senior security director told Salesforce 2013 Dreamforce delegates today. Speaking at the San Francisco event, senior director of product management for security Eric Leach said that though Salesforce had already "built two-factor authentication and a higher assurance type of session into the Salesforce platform", more was to be expected to keep customers' peace of mind as online threats escalate.