Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: CEOs in Technology, PC Security Journal, Comodo Encryption

PC Security Journal: Blog Post

Mobile Devices: Authenticate or Encrypt?

Michael Hickins Reports on Iranian Phone Spoofing

Two conflicting opinions crossed my desk today.

Michael Hickins reported on Iranian Phone Spoofing, Fake Twitter Accounts And Trust in his blog at InformationWeek.  People are spoofing cell phone calls to his Iranian friends' phone accounts, to avoid sanctions for calling Iran.  "Cybersecurity expert Melih Abdulhayoglu, CEO of Comodo, tells me that content authentication is "the next big thing," Hickins wrote.

I was already thinking about the insecurity of cell phone communications because Molly Dolesalek reported on them in Processor Magazine. "It's fairly easy to tap into a cell phone conversation, but the business world doesn't really understand that," Dunleavy says. For that reason, he believes that there will be more interest in voice encryption, including VoIP encryption," she wrote, quoting Mike Dunleavy, president of Diginonymous.

Authenticate or encrypt?   Look how hard it's been to interest the public in email encryption and digital signature, even after Sarah Palin's famous breach last year.  Most cell phone users will continue to take no precautions.

Remember, you heard it here first.

More Stories By Katharine Hadow

Katharine Hadow is a marketing communications professional in New Jersey, USA