Weekend Reads 091418
Security
You install a new app on your phone, and it asks for access to your email accounts. Should you, or shouldn’t you? TL;DR? You shouldn’t. When an app asks for access to your email, they are probably reading your email, performing analytics across it, and selling that information. Something to think about: how do they train their analytics models? By giving humans the job of reading it.
When you shut your computer down, the contents of memory are not wiped. This means an attacker can sometimes grab your data while the computer is booting, before any password is entered. Since 2008, computers have included a subsystem that wipes system memory before starting any O/S launch—but researchers have found a way around this memory wipe.
You know when your annoying friend talks about the dangers of IoT when you bragging about your latest install of that great new electronic doorlock that works off your phone? You know the one I’m talking about. Maybe that annoying friend has some things right, and we should really be paying more attention to the problems inherent in large scale IoT deployments. For instance, what would happen if you could get the electrical grid in Continue reading









The GSMA Mobile Economy report predicts that there will be 200 million 5G mobile connections in the U.S. and Canada by 2025, putting it ahead of Europe and key Asian markets.
The service is targeted to mobile virtual network operators, cable operators that want to provide a mobile service, and traditional mobile operators that want to expand outside of their footprint.
The vendor is taking advantage of OpenStack and virtualization platforms like containers and the container environment.