Category Archives: Mobile Phone
Mobile Verizon Named Brand Of The Year by the consumer
Verizon mobile network named brand in consumers for the second year in a row, according to a new poll from Harris Interactive.
“Given the change of telephone number portability, mobile transfer and mobile networks is significantly easier,” said Jeni Lee Chapman, Executive Vice President of Brand and Communication Consulting at Harris Interactive.
“Verizon’s strong brand equity can have a large impact when consumers have a choice.”
Motorola, persuaded by strong familiarity and a significant increase from last year, led the mobile phone category, followed by HTC and Sony Ericsson. Nokia and Apple ranked fifth fourth.
“Apple may have the market cornered on technology enthusiasts, but Motorola to meet a wider audience,” said Ms. Chapman.
“There is still a large audience of consumers who are not interested in smartphones to run their lives, and Apple is not a product to meet that need.”
Sony continues to be the market leader in consumer electronics, followed closely by Samsung, Panasonic and LG, who all rose to narrow the gap in brand equity. In the game category, Nintendo ranked highest, followed by Sony and Microsoft Xbox.
Threats to Expect in Mobile, Social Location, and Email in 2011
It was the end of the year, and it’s time to start looking forward to 2011. While we can speculate about a lot of subjects, some important trends as expectations related to security. We asked an expert in the field about some of the things he anticipates. WebProNews interviewed Paul Wood, MessageLabs Intelligence Sr. Analyst at Symantec Hosted Services about what you can expect and consumer facing businesses remain safe for the next year.
Mobile Phone and Tablet
First, we ask what are the implications of all the new mobile devices and tablet security has come in the years ahead. “Three trends emerge,” said Wood us. “The increase in processing power of mobile devices means more opportunity for malware to run on this device. As their numbers and increased use, their practical targets for attackers. Many brands of mobile devices will share the same chipset and threats that target vulnerabilities in some chipsets will come in 2011. ‘
“Increasing the scene from the perspective of technology means that more people than ever are using mobile devices to access their email and social networking circles,” he continued. “From a corporate perspective, business users to access business data and services while traveling – often beyond the physical corporate network – so apply the same rules to enforce acceptable use policies, for example – will become more important.”
“Security Protection is required to operate seamlessly across multiple platforms as users move between devices and laptops that are used to store and transmit information online,” he added. “Businesses looking to the cloud to achieve information-term, regardless of how to access the data. There will also be a journey to the cloud-based strong authentication and to the cloud to remove malicious threats before they reach the network or device. ‘
Social Media Threats
When asked whether social networks such as Facebook and Twitter will begin a larger security problem or less of an issue next year, Wood said, “Social networking will continue to be a persuasive force and continue to be utilized as a way to run a confidence trick – social engineering attacks – and The risk of the spread of malware unchanged from this year, but may increase the level of sophistication involved may manifest as a phishing attack to compromise from those accounts are legal and third party applications will be possible. continuing source of malware and attacks on privacy. We expect to see more targeted virtual money online scams. ‘
As you may be aware, location sharing become more common thanks to the capabilities of the mobile phone market and the saturation of check-in apps. We asked Wood to threats based location sharing becomes a bigger problem. “Probably not, it’s hard to see how to monetize Internet attacks using a shared location,” he said. “An attack that can be predicted is for malware information site pretends to improve the ranking of the popularity of the location or false. This type of information will be of value to the observation stage before a targeted attack, or perhaps before burgling someone’s house – a thief can find the owner of the other “.
Can you imagine a site account / Twitter called PleaseRobMe, dedicated to showcasing the most points.
As far as changes in the next year about spam email, Wood said, “It will still be more than 90% of all e-mail for most of 2011 Botnet hold a major threat and a major source of spam. – Currently 90% of spam is sent from botnets. ‘
“Spam URL shortening using a link because this is a legitimate domain – we can find a legitimate domain stands threatened or spammers to promote their own services such as, the use of domain names to use and chaining them together,” he predicts. “Spam has become the use of news and current events with RSS feeds from major news aggregator consuming and using headlines as the subject of the message. More spam was sent from the new economy, especially East Africa as increased broadband capacity will be deployed in the region. ‘
Business One thing you never have to
Finally, we asked Wood if he does not mention it as the most important step in business to do to protect their data, whether it?
“Know what you’re trying to protect,” he said. “Too many businesses are looking for a magic bullet to make security go is the fact that security is achieved by knowing what you are trying to protect – you know your assets, with access to these assets and in what circumstances, and what attack directed against the asset. Taking into account these problems, businesses can produce a coherent defense to protect their systems still allow employees to continue their work. ‘
Symantec’s Kevin Haley has some of the more interesting predictions for 2011 in a new report here.