{"id":7904,"date":"2015-03-10T12:27:48","date_gmt":"2015-03-10T16:27:48","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=7904"},"modified":"2019-11-15T23:01:32","modified_gmt":"2019-11-15T12:01:32","slug":"mwc2015-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/mwc2015-security\/7904\/","title":{"rendered":"Four promising IT security trends of MWC 2015"},"content":{"rendered":"<p>The Mobile World Congress often gladdens our heart with lots of visitors and participants who care about security. It\u00a0is quite natural taking into account the event is held by the GSMA Association. This year was no\u00a0exception with security being one of the main themes at the MWC 2015. Let\u2019s see what trends Kaspersky Lab identified at the event.<\/p>\n<h3>Trend #1: Security in the IoT<\/h3>\n<p>On Kaspersky Daily we\u2019ve regularly written about how unexpectedly vulnerable connected devices can be because too many things are going to be connected: from refrigerators, coffee machines, TVs and microwaves to fitness bands and other wearable devices, and even drones. This flood of connected appliances can lead to unexpected consequences. Unfortunately, the majority of manufacturers and developers have very little experience in the field of IoT security.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Internet of Crappy Things <a href=\"http:\/\/t.co\/ixh39TL0nJ\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/ixh39TL0nJ<\/a><\/p>\n<p>\u2014 Hacker News Bot (@newsycombinator) <a href=\"https:\/\/twitter.com\/newsycombinator\/status\/569421851564384256?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Kaspersky Lab is not alone in its struggle against the thoughtless attitude to this problem: at MWC a great many people raised the question of connected device protection. That\u2019s wonderful news: the sooner users and developers understand the problem the quicker we\u2019ll see the secured world of connected devices.<\/p>\n<h3>Trend #2: Cryptophones<\/h3>\n<p>In the last two years we had numerous data leaks and other \u2018breaking\u2019 information about global eavesdropping conducted by officials, hackers, or even the kid\u00a0living next door. All of this news has generated a profound demand for secured and private communication. This is why a heavily encrypted Blackphone was created (in case you missed it, last summer we published a detailed review of this cryptophone).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Blackphone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Blackphone<\/a> review: is a secure <a href=\"https:\/\/twitter.com\/hashtag\/smartphone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#smartphone<\/a> possible? <a href=\"http:\/\/t.co\/D6rcSRv9y5\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/D6rcSRv9y5<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/encryption?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#encryption<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Android?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Android<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/502115559983841281?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 20, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This year, MWC Silent Circle has unveiled a new updated Blackphone 2 and a Blackphone Plus \u2014 a security-centric tablet. Both devices run PrivatOS and are packed with different security features, including a new: a Spaces virtualization system that lets users create multiple separate \u2018spaces\u2019 for apps, data and accounts. It\u2019s like having several separated smartphones inside one device.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Blackphone unveils a new phone and tablet running secure, encrypted Android <a href=\"http:\/\/t.co\/D7EQSODIAV\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/D7EQSODIAV<\/a> <a href=\"http:\/\/t.co\/74qPd6iTib\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/74qPd6iTib<\/a><\/p>\n<p>\u2014 The Verge (@verge) <a href=\"https:\/\/twitter.com\/verge\/status\/572397333511598080?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 2, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Brazilian company Sikur has presented another security-minded solution called GranitePhone. Developers followed a very radical approach: the GranitePhone OS has no browser, there is no access to the phone\u2019s camera and a user is not permitted to install any (literally \u2014 any) apps. GranitePhone can send and receive emails and SMS, make calls and browse through documents.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Who has the most secure smartphone? GranitePhone and Kymera enter the race! <a href=\"http:\/\/t.co\/hsONB0S5y1\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/hsONB0S5y1<\/a> <a href=\"http:\/\/t.co\/0qdvEpGGVC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/0qdvEpGGVC<\/a><\/p>\n<p>\u2014 PCMag (@PCMag) <a href=\"https:\/\/twitter.com\/PCMag\/status\/573280155445014528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Encrypted communications are enabled between two GranitePhones or with iOS\/Android devices running the company\u2019s software. You can make calls to other phones as well, but they won\u2019t be encrypted. As you can see it\u2019s not a universal device, but a second phone for those who often work with sensitive data.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#MWC2015: four promising IT #security trends<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FH9An&amp;text=%23MWC2015%3A+four+promising+IT+%23security+trends\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Another cryptophone presented at MWC is called a LockPhone. Together with a LockTab tablet they both come from Hong Kong. They are protected with a method of 1,024-bit device encryption that is also extended to calls, SMS and email messaging to enable secure communication (but only between two owners of LockPhones). We don\u2019t understand why the developer calls these solutions \u201cthe First Encrypted Smartphone and Tablet,\u201d which is untrue, of course.<\/p>\n<h3>Trend #3: Biometricks<\/h3>\n<p>Qualcomm, the world\u2019s largest smartphone chip manufacturer, unveiled the main biometric innovation at MWC 2015. Its fingerprint recognition is no longer based on optical nor capacitive sensors. Instead, Qualcomm has adopted a new technology that uses ultrasonic waves to scan a 3D image of your finger surface.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/FtKKZyYbZtw?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>There\u2019s a number of reason why we believe it\u2019s a promising innovation. First of all, it can read your fingerprint through glass, aluminum, stainless steel, sapphire, and plastics. Theoretically, manufacturers should be able to build the sensor into almost any part of a phone or tablet.<\/p>\n<p>https:\/\/instagram.com\/p\/zuSbwYw5mo\/<\/p>\n<p>Secondly, Qualcomm also promises that new sensors will work much quicker and more accurately with fewer number of rejected swipes. It\u2019s worth mentioning that fast recognition of fingerprint allows this technology to scan picture in dynamic and to distinguish a real finger from a cast by detecting a pulse. Besides, the new ultrasonic sensor works even if your finger is a little bit dirty or wet.<\/p>\n<p>Currently there are no gadgets equipped with new Qualcomm sensors, but no doubt we\u2019ll see them in the near future.<\/p>\n<p>Good news for fans of Samsung devices: the company has finally made a switch to new fingerprint sensors. Galaxy S6 and Galaxy S6 Edge have adopted new ones that do not require a swipe. Just like the iPhone, to start using a device you need to touch the sensor.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/QqvIROJH87k?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>Trend #4: Tracking kids location<\/h3>\n<p>Many companies presented solutions for kids\u2019 security, including child-tracking devices. There were both software solutions and stand-alone trackers that help the parents monitor the location of their children.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Safe Kids: download FREE protection against <a href=\"https:\/\/twitter.com\/hashtag\/cyberbullying?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cyberbullying<\/a> for your kids (Win\/Mac\/iOS\/Android) <a href=\"http:\/\/t.co\/scrjRhWZ18\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/scrjRhWZ18<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/573497461886451715?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>At\u00a0MWC 2015 Kaspersky Lab presented a beta-version of a multifunctional mobile app, Safe Kids. It has a GPS tracking feature as well. If you wish, you can download it for free from Google Play and the Apple App Store.<\/p>\n<h3>Bonus-trend: smart sensor tags<\/h3>\n<p>There was an amusing presentation at this year\u2019s MWC, thanks to an intelligent Johnnie Walker Blue Label bottle presented by a global drinks giant Diageo and Norwegian semiconductor company Thin Film Electronics, who develops smart NFC tags. The smart bottle is equipped with smart tags that can detect when the seal is broken and send this information directly to a consumer\u2019s smartphone.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Johnny Walker unveils its smart bottles: <a href=\"http:\/\/t.co\/SWMJnlAcdt\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/SWMJnlAcdt<\/a> <a href=\"http:\/\/t.co\/mEql4dHgbY\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mEql4dHgbY<\/a><\/p>\n<p>\u2014 Forbes Tech (@ForbesTech) <a href=\"https:\/\/twitter.com\/ForbesTech\/status\/572481500874194944?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 2, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Though this demonstration may seem\u00a0frivolous, the NFC tags solve serious problems. For instance, another model of tag \u2013 that is also manufactured by Thin Film Electronics \u2013 continuously monitors the temperature in which food is being stored and relays\u00a0this information via NFC. Electronics are becoming\u00a0cheaper day-by-day and it\u2019s quite possible that in the near future we\u2019ll see every milk package equipped with an intelligent tag.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s identify the main IT security and protection trends at MWC 2015.<\/p>\n","protected":false},"author":421,"featured_media":7906,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,1011,189,261,999,658,794,193,320,553,996,364,43,192,457,97,45],"class_list":{"0":"post-7904","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-cryptophones","10":"tag-data-security","11":"tag-encryption","12":"tag-gadgets","13":"tag-internet-of-things","14":"tag-iot","15":"tag-mobile-device","16":"tag-mobile-world-congress","17":"tag-mwc","18":"tag-mwc2015","19":"tag-parental-control","20":"tag-privacy","21":"tag-protection","22":"tag-samsung","23":"tag-security-2","24":"tag-smartphones"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mwc2015-security\/7904\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mwc2015-security\/4703\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mwc2015-security\/5210\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mwc2015-security\/7157\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mwc2015-security\/7904\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mwc2015-security\/7059\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mwc2015-security\/7157\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mwc2015-security\/7904\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/7904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=7904"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/7904\/revisions"}],"predecessor-version":[{"id":24818,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/7904\/revisions\/24818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/7906"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=7904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=7904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=7904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}