SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Only a Trusted Hosted Softswitch Should Have Access to Your Smartphone

TMCnews Featured Article


September 04, 2014

Only a Trusted Hosted Softswitch Should Have Access to Your Smartphone

By Susan J. Campbell, TMCnet Contributing Editor


Do you remember how excited you were the first time you accessed a hotspot with your mobile device? The thought of using all capabilities and connections without cutting into allocated data or minutes was kind of exhilarating. As the smartphone became the go-to device and hotspots starting popping up everywhere through the hosted softswitch or simple in-house deployments, it became a way of life.


Something else became a way of life – taking the necessary steps to protect our information and devices from hackers. We’re used to the conversation when it comes to laptop use in the local coffee shop. But, did you know your smartphone is also at risk of hacking when you’re using a public hotspot? There’s nothing in place in such environments to ensure hackers won’t get to your personal information. In fact, they’ve developed the perfect tools to ensure you just aren’t safe in these environments.

As such, hosted softswitch solution providers like REVE Systems suggest that you limit your use of public hotspots and instead use protected Wi-Fi from providers you trust. As much as you may want to preserve your allocated data, is it worth risking your personal information or the use of your smartphone just to access those bandwidth intensive apps or videos at the local coffee shop? This isn’t a scare tactic – it’s an important question in light of recent activity.

A recent Wiz Bang blog highlighted just how much damage can occur when hackers realize success. Late Sunday, both 4Chan and Reddit were inundated with large collections of stolen nude pictures from a long list of celebrities. Maybe you heard about it – social media channels have been flooded with articles and posts regarding the hacks and subsequent distributions. The photos were plastered all over the sites when hackers successfully gained access and distributed with reckless abandon.

The original source of the photos is still under investigation. Apple’s (News - Alert) iCloud backup service has been mentioned more than a few times as the possible hacked culprit. Other theories have emerged from industry experts, some suggesting the FindMyiPhone API has a known vulnerability and that the Wi-Fi connection at the Emmy’s last month was a little too vulnerable. Given the volume of the stolen data, the target was likely hacked email accounts.

The point is hackers are out there targeting anyone and everyone and it’s up to the user to protect his or her device and information. With this knowledge in hand, what will be your strategy the next time a public hotspot is within reach?




Edited by Stefania Viscusi







Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy