|By Katharine Hadow||
|September 22, 2009 07:15 PM EDT||
Two conflicting opinions crossed my desk today.
Michael Hickins reported on Iranian Phone Spoofing, Fake Twitter Accounts And Trust in his blog at InformationWeek. People are spoofing cell phone calls to his Iranian friends' phone accounts, to avoid sanctions for calling Iran. "Cybersecurity expert Melih Abdulhayoglu, CEO of Comodo, tells me that content authentication is "the next big thing," Hickins wrote.
I was already thinking about the insecurity of cell phone communications because Molly Dolesalek reported on them in Processor Magazine. "It's fairly easy to tap into a cell phone conversation, but the business world doesn't really understand that," Dunleavy says. For that reason, he believes that there will be more interest in voice encryption, including VoIP encryption," she wrote, quoting Mike Dunleavy, president of Diginonymous.
Authenticate or encrypt? Look how hard it's been to interest the public in email encryption and digital signature, even after Sarah Palin's famous breach last year. Most cell phone users will continue to take no precautions.
Remember, you heard it here first.
- Patent-Pending Hardware-free Hackerguardian Scans Networks in the Cloud
- The Economist Reports on Cyber Warfare
- Comodo Says Send Email, Not Postcards Scrawled in Pencil
- 免费提升Windows XP, Vista和Windows 7的性能
- Abdulhayoglu: Avoiding Porn and Gambling Not Enough to Avoid Infection
- Two-Factor Authentication Secures Microsoft SharePoint and Outlook Web Access
- Comodo Innovations at SC World Congress October 13 and 14
- Бесплатная утилита Comodo System-Cleaner оптимизирована для Windows 7
- Developers and End Users Benefit from Code-signing Certificates
- Online Encryption: Roots Are Showing