& cplSiteName &
Comments
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
SachinEE
SachinEE
2/27/2014 | 5:34:25 AM
Operators See Eye-to-Eye on SIM-Based Security
@Phill_britt: That is the most common danger to a technology, i.e. hackers! With developing technology, hackers become more powerful, and there is simply no way to stop them (unless of course, hiring them for your cause solves your problem temporarily). What we can do is increase knowledge and spread awareness about hackers.
SachinEE
SachinEE
2/27/2014 | 5:33:31 AM
SIM based authentication
Every year thousands of sim cards go missing, not to mention the amount of phones that are stolen. If there should be sim based authentication, then there should also be a way to counter the stolen sim cards or the sim cards inside the phones that go missing. Most of the stolen sim cards are without documents, and can be used with any alias in the world. Accessing the services through those sim cards can easily be done and this increases the possibility of mal-usage. Also, the sim cards of the stolen phones already have an alias and documents nd they can be used to access sensitive information, including the increased danger to the personal life of the victim. Not only that, such sim cards can land in the hands of hackers and they can reverse engineer it (software wise) and wreck havoc.
Phil_Britt
Phil_Britt
2/26/2014 | 9:01:12 AM
The More Security the Better
Hackers continue to become more and more pervasive and more and more aggressive. So security precautions should follow -- or better yet, lead -- suit. Cybercriminals will continue to go after the weak links, so it's important to have as few of those as possible. Of course, no system is entirely secure.


Featured Video
Upcoming Live Events
October 1-2, 2019, New Orleans, Louisiana
October 10, 2019, New York, New York
October 22, 2019, Los Angeles, CA
November 5, 2019, London, England
November 7, 2019, London, UK
November 14, 2019, Maritim Hotel, Berlin
December 3, 2019, New York, New York
December 3-5, 2019, Vienna, Austria
March 16-18, 2020, Embassy Suites, Denver, Colorado
May 18-20, 2020, Irving Convention Center, Dallas, TX
All Upcoming Live Events
Partner Perspectives - content from our sponsors
Edge Computing, the Next Great IT Revolution
By Rajesh Gadiyar, Vice President & CTO, Network & Custom Logic Group, Intel Corp
Innovations in Home Media Terminals for the Upcoming 5G Era
By Tang Wei, Vice President, ZTE Corporation
All Partner Perspectives