{"id":5532,"date":"2015-03-11T09:37:42","date_gmt":"2015-03-11T13:37:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5532"},"modified":"2020-02-26T15:11:01","modified_gmt":"2020-02-26T15:11:01","slug":"four-promising-it-security-trends-of-mwc-2015","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/four-promising-it-security-trends-of-mwc-2015\/5532\/","title":{"rendered":"Four promising IT security trends of MWC 2015"},"content":{"rendered":"<p>MWC often gladdens our heart with lots of visitors and participants who care much about security and that is quite natural taking into account that the event is held by <a href=\"http:\/\/en.wikipedia.org\/wiki\/GSM_Association\" target=\"_blank\" rel=\"noopener nofollow\">GSMA<\/a> Association. This year was not an exception with security being one of the main themes at Mobile World Congress 2015. Let\u2019s see what main trends Kaspersky Lab identified at the event.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/03\/05192523\/2-1-1024x819.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5533\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/03\/05192523\/2-1-1024x819.jpg\" alt=\"2\" width=\"1280\" height=\"1024\"><\/a><\/p>\n<h3>Trend #1: Security in the IoT<\/h3>\n<p>On Kaspersky Daily <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=IoT&amp;submit=Search\" target=\"_blank\" rel=\"noopener nofollow\">we\u2019ve regularly written<\/a> about how unexpectedly vulnerable connected devices can be just because too many things are going to be connected: from refrigerators, coffee machines, TVs and microwaves to fitness bands and other wearable devices and even drones. This flood of connected appliances can lead to unexpected consequences. Unfortunately, the majority of manufacturers and developers have <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-crappy-things\/\" target=\"_blank\" rel=\"noopener nofollow\">very little experience in the field of IoT security<\/a>.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Internet of Crappy Things <a href=\"http:\/\/t.co\/ixh39TL0nJ\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/ixh39TL0nJ<\/a><\/p>\n<p>\u2014 Hacker News Bot (@newsycombinator) <a href=\"https:\/\/twitter.com\/newsycombinator\/status\/569421851564384256?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>It appeared that Kaspersky Lab is not alone in its struggle against thoughtless attitude to this problem: on MWC a great many of people raised the question of connected device protection. That\u2019s wonderful news: the sooner users and developers understand the problem the quicker we\u2019ll see the secured world of connected devices.<\/p>\n<p>\u00a0<\/p>\n<h3>Trend #2: Cryptophones<\/h3>\n<p>In last two years we had numerous data leaks and other \u2018breaking\u2019 information about global eavesdropping of everything everywhere conducted by officials, hackers or even a boy or a girl living next door. All these news have generated a profound demand for secured and private communication. This is why a heavily encrypted Blackphone was created (in case you missed it, last summer we <a href=\"https:\/\/www.kaspersky.com\/blog\/blackphone-review\/4956\/\" target=\"_blank\" rel=\"noopener nofollow\">published a detailed review<\/a> of this cryptophone).<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Blackphone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Blackphone<\/a> review: is a secure <a href=\"https:\/\/twitter.com\/hashtag\/smartphone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#smartphone<\/a> possible? <a href=\"http:\/\/t.co\/D6rcSRv9y5\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/D6rcSRv9y5<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/encryption?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#encryption<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Android?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Android<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/502115559983841281?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 20, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>This year on MWC Silent Circle has unveiled a new updated Blackphone 2 and a Blackphone Plus \u2014 a security-centric tablet. Both devices run PrivatOS and are packed with different security features. And there is a new one: Spaces virtualization system that lets users create multiple separate \u2018spaces\u2019 for apps, data and accounts. It\u2019s like having several separated smartphones inside one device.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Blackphone unveils a new phone and tablet running secure, encrypted Android <a href=\"http:\/\/t.co\/D7EQSODIAV\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/D7EQSODIAV<\/a> <a href=\"http:\/\/t.co\/74qPd6iTib\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/74qPd6iTib<\/a><\/p>\n<p>\u2014 The Verge (@verge) <a href=\"https:\/\/twitter.com\/verge\/status\/572397333511598080?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 2, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>Brazilian company Sikur has presented another security-minded solution called GranitePhone. Developers followed a very radical approach: the GranitePhone OS have no browser, there is no access to the phone\u2019s camera and a user is not permitted to install any (literally \u2014 any) apps. GranitePhone can send and receive emails and SMS, make calls and browse through documents.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Who has the most secure smartphone? GranitePhone and Kymera enter the race! <a href=\"http:\/\/t.co\/hsONB0S5y1\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/hsONB0S5y1<\/a> <a href=\"http:\/\/t.co\/0qdvEpGGVC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/0qdvEpGGVC<\/a><\/p>\n<p>\u2014 PCMag (@PCMag) <a href=\"https:\/\/twitter.com\/PCMag\/status\/573280155445014528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Encrypted communications are enabled between two GranitePhones or with iOS\/Android devices running the company\u2019s software. You can make calls to other phones as well but they won\u2019t be encrypted. As you can see it\u2019s not a universal device, but a second phone for those who often work with sensitive data.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#MWC2015: four promising IT #security trends<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fu8Vw&amp;text=%23MWC2015%3A+four+promising+IT+%23security+trends\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u00a0<\/p>\n<p>Another cryptophone presented on MWC is called a LockPhone. Together with a LockTab tablet they both come from Hong Kong. They are protected with a method of 1,024-bit device encryption that is also extended to calls, SMS and email messaging to enable secure communication (but only between two owners of LockPhones). For some reasons we don\u2019t understand the developer calls these solutions \u201cthe First Encrypted Smartphone and Tablet\u201d which is untrue, of course.<\/p>\n<p>\u00a0<\/p>\n<h3>Trend #3: Biometricks<\/h3>\n<p>Qualcomm,world\u2019s largest smartphone chip manufacturer, unveiled the main biometric innovation on MWC 2015. Its fingerprint recognition is no longer based on optical nor capacitive sensors. Instead Qualcomm has adopted a new technology that uses ultrasonic waves to scan a 3D image of your finger surface.<\/p>\n<p>\u00a0<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/FtKKZyYbZtw?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>\u00a0<\/p>\n<p>There\u2019s a number of reason why we believe it\u2019s a promising innovation. First of all it can read your fingerprint through glass, aluminum, stainless steel, sapphire, and plastics. Theoretically, manufacturers should be able to built the sensor into almost any part of a phone or tablet.<\/p>\n<p>\u00a0<\/p>\n<p>https:\/\/instagram.com\/p\/zuSbwYw5mo\/<\/p>\n<p>\u00a0<\/p>\n<p>Secondly, Qualcomm also promises that new sensors will work much quicker and more accurate with fewer number of rejected swipes. It\u2019s worth mentioning that fast recognition of fingerprint allows this technology to scan picture in dynamic and to distinguish real finger from cast by seeing beating of pulse. Besides, the new ultrasonic sensor works even if your finger is a little bit dirty or wet.<\/p>\n<p>Currently there are no gadgets equipped with new Qualcomm sensors but no doubt we\u2019ll see them in the near future.<\/p>\n<p>\u00a0<\/p>\n<p>Good news for all fans of Samsung devices: the company has finally made a switch to new fingerprint sensors. Galaxy S6 and Galaxy S6 Edge have adopted new ones that do not require a swipe anymore. Just like in iPhone to start using a device you need to touch the sensor.<\/p>\n<p>\u00a0<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/QqvIROJH87k?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>\u00a0<\/p>\n<h3>Trend #4: Tracking kids location<\/h3>\n<p>Many companies presented solutions for kids\u2019 security, including child-tracking devices. There were both software solutions and stand-alone trackers that help the parents monitor the location of their children.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Safe Kids: download FREE protection against <a href=\"https:\/\/twitter.com\/hashtag\/cyberbullying?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cyberbullying<\/a> for your kids (Win\/Mac\/iOS\/Android) <a href=\"http:\/\/t.co\/scrjRhWZ18\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/scrjRhWZ18<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/573497461886451715?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>On MWC 2015 Kaspersky Lab presented a beta-version of multifunctional mobile app Safe Kids that has a GPS tracking feature as well. If you wish, you can download it for free from <a href=\"http:\/\/kas.pr\/akids\" target=\"_blank\" rel=\"noopener\">Google Play<\/a> and <a href=\"http:\/\/kas.pr\/ikids\" target=\"_blank\" rel=\"noopener\">Apple App Store<\/a>.<\/p>\n<p>\u00a0<\/p>\n<h3>Bonus-trend: smart sensor tags<\/h3>\n<p>This year an amusing factor on MWC 2015 was raised enormously thanks to an intelligent Johnnie Walker Blue Label bottle presented by a global drinks giant Diageo and Norwegian semiconductor company Thin Film Electronics that develops smart NFC tags. The smart bottle is equipped with smart tags that can detect when the seal is broken and send this information directly to a consumer\u2019s smartphone.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Johnny Walker unveils its smart bottles: <a href=\"http:\/\/t.co\/SWMJnlAcdt\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/SWMJnlAcdt<\/a> <a href=\"http:\/\/t.co\/mEql4dHgbY\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mEql4dHgbY<\/a><\/p>\n<p>\u2014 Forbes Tech (@ForbesTech) <a href=\"https:\/\/twitter.com\/ForbesTech\/status\/572481500874194944?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 2, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>Despite the frivolous kind of these particular demonstration the NFC tags solve serious problems. For instance, another model of tag that is also manufactured by Thin Film Electronics continuously monitors the temperature in which food is being stored and tells this information via NFC. Electronics is growing cheaper day-by-day and it\u2019s quite possible that in the near future we\u2019ll see every milk package equipped with intelligent tag.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MWC often gladdens our heart with lots of visitors and participants who care much about security and that is quite natural taking into account that the event is held by<\/p>\n","protected":false},"author":437,"featured_media":5533,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[105,938,189,261,930,636,770,193,320,535,925,364,43,192,448,97,45],"class_list":{"0":"post-5532","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-cryptophones","11":"tag-data-security","12":"tag-encryption","13":"tag-gadgets","14":"tag-internet-of-things","15":"tag-iot","16":"tag-mobile-device","17":"tag-mobile-world-congress","18":"tag-mwc","19":"tag-mwc2015","20":"tag-parental-control","21":"tag-privacy","22":"tag-protection","23":"tag-samsung","24":"tag-security-2","25":"tag-smartphones"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/four-promising-it-security-trends-of-mwc-2015\/5532\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/four-promising-it-security-trends-of-mwc-2015\/2694\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5532"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5532\/revisions"}],"predecessor-version":[{"id":19200,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5532\/revisions\/19200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5533"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}