Earlier this week, over 14 million Verizon customers had sensitive user data associated with their Verizon accounts released into the wild. A third-party vendor had stored the database on an improperly secured cloud server. While this unsecured server was located in the Amazon Web Services (AWS) cloud, the data breach was determined to be a result of human error on the contractor’s part, not any inherent security vulnerability in the AWS cloud.Details
Advanced data services for mobile service providers and subscriber analytics. The data-as-a-service model offers OEMs and companies a way to access data safely. Data analytics helps enterprises and business make effective decisions and support customer needs through analysis of user behavior. It also supports contextual targeting for mobile device advertising.
zvelo, the leading provider of website and device categorization, today announced the launch of zveloDP – an open, scalable, Data as a Service (“Daas”) platform which provides access to page-level, traffic and device categorization (including malicious and profiling) datasets through easy-to-implement APIs.
As a media buyer previously, I was always frustrated with the lack of tracking on iOS in mobile inventory. However, it was possible to track performance on Android and as Android’s market share grew, so did the conversions attributed to mobile display. Mobile apps, however, were another story altogether – as a performance shop, I…
The prospect, a leading provider of big data analytics solutions, had identified a need to capture, curate, categorize and visualize the massive amounts of web usage data sets stemming from mobile service providers…Details
I had the privilege of discussing the state of mobile phone payments systems, like Google Wallet, on a local radio station show called “Backbone Radio” in mid-February, 2012, which is co-hosted by Joshua Sharf. The segment aired on 710-AM KNUS in Denver and 1460-AM KZNT radio out of Colorado Springs.
Much has been said in the last few days about the security of the Android platform in general and Google Wallet specifically. One frequent question that has been asked of the Google Wallet PIN vulnerability we found is “should the average consumer be concerned about mobile device exploits that require root privileges?” The unfortunate answer is “yes.” The reason is that while it is true that this PIN vulnerability requires root privileges to succeed, it does not require that the device be rooted previously.
Cell phone-based credit card payments are a burgeoning industry. There is a great deal of backroom negotiation going on today among players like Google, Verizon, AT&T and T-Mobile. They each want to establish themselves as a middleman in what they are betting will be a trillion dollar a year industry. The stakes are very high.
Identify and implement a solution that would provide safe Web Browsing protection from malicious and compromised websites for users of the Company’s flagship Mobile Security security offering. Additionally, provide parental…Details