Tag Archive for: Cons

The biggest security pros and cons of using Bluetooth GPS trackers


Bluetooth tagging devices are catching on, and keeping an eye out on the world in ways never before possible. For that relative who is always losing track of their keys or wallet, these devices from Apple, Samsung and some niche gadget players like Life360, offer a new approach to minding belongings. For pet owners, these GPS devices can be used as a cheaper alternative to microchipping your dog.

“If you’re someone who forgets your keys, or your purse, or your child, and you want to track them, then these are not a bad way to do that,” said Justin Cappos, associate professor of Computer Science and Engineering at New York University Tandon School of Engineering and a member of New York University’s Center for Cybersecurity.

But the idea of tags to track people, specifically, is where the controversy has been introduced as part of this technology’s adoption.

From Apple’s AirTag to Samsung’s Galaxy SmartTag to Life360’s Tile, there are many options in the Bluetooth tagging device market offering security and peace of mind, but notably, the company’s in the market, from Apple to Life360, have made clear these devices were never designed to track people — Apple’s product messaging focuses only on personal items. That doesn’t change the fact that as with most of the technological advances occurring at an accelerated rate in recent decades, from phones to social media and AI, there is never a breakthrough that arrives without a potential downside. Tags are being put to nefarious uses, including to stalk individuals.

“If you want to track somebody, that’s what these are designed for, and that’s where the problem really comes in,” Cappos said. “You have something that it’s intended use and it’s malicious use are almost identical.”

Here are some basics to know about Bluetooth tags if you’re using one already, or considering adding one to your tech-enabled life.

The risk of stalking is real, tech companies are addressing it

There have been several crimes reported involving the use of Bluetooth tagging devices to stalk victims, specifically younger women and women being stalked by former spouses or relationship partners. Attaching these devices to cars has been common, but there have been…

Source…

Pros and Cons of 5G


With the introduction of the 5G Stand Alone (SA) method for operating a 5G base station independently by an independent 5G core network, 5G will finally be able to simultaneously support three different requirements: enhanced mobile broadband (eMBB) (high speed and large capacity), ultra-reliable and low-latency communication (URLLC), and massive machine type communication (mMTC) (ultra-mass terminal).

Pros and Cons of 5G

According to Deloitte Insights, there were 756 private network deployments in enterprises worldwide as of January 2022, a 43% increase from the previous year. As 5G becomes a reality, organizations need to carefully consider the pros and cons of implementing private networks to guide an effective security strategy.

PROS

On-premises coverage: With many organizations using the hybrid cloud, on-premises coverage is critical. Furthermore, it extends coverage to enterprises in remote facilities where public networks don’t exist or indoor coverage is limited.

Speed and low latency: 5G dramatically reduces the time for network devices to respond to commands and reduces latency to less than 5 milliseconds (the ultimate target is 2 milliseconds according to The Third Generation Partnership Project [3GPP]}.

Capacity: With private 5G, you’re no longer competing with other public users for bandwidth. This allows you to simultaneously connect up to 100 times more devices per square kilometer than 4G, removing the need for enterprises to strategize cellular and Wi-Fi as an either/or proposition.

Advanced technologies: Particularly in the manufacturing industry, 5G networks are essential for running collaborative mobile robots, self-driving machines, automatic guided vehicles (AGVs), augmented reality (AR) predictive maintenance, and other smart factory technologies. Private 5G will enable smart factories to implement artificial intelligence (AI) and machine learning (ML) applications quickly without disrupting the production line and supply chain. There is also the potential to build a factory without wires or cable, reducing associated costs and time spent on construction.

Security: Improved security capabilities was the leading motivation of private wireless…

Source…

The pros and cons of Netskope SASE


The Secure Access Service Edge market is full of vendors claiming to lead the pack, among them Netskope.

A quick visit to Netskope’s website shows that the company considers itself “the SASE leader,” citing cloud access security broker (CASB), firewall, secure web gateway (SWG) and zero-trust network access (ZTNA) built into a single platform. However, Netskope falls short of delivering the promise of SASE, instead offering a comprehensive CASB product with added-on capabilities that loosely align to the SASE narrative.

What is SASE?

SASE represents the convergence of networking and security capabilities, ideally delivered as a cloud-native service instead of edge appliances that have been common to IT. While SASE encompasses about a dozen security capabilities, the focus is less on a feature-by-feature comparison and more about reducing complexity to deliver consistent, high-performance security and connectivity to users globally.

While the capabilities SASE vendors provide are nothing new, the convergence of technologies, coupled with the shift to a global, cloud-delivered service architecture, is revolutionary.

Netskope SASE

Netskope started with its CASB functionality, which provides protection and visibility for data at rest (Netskope API protection) and data in motion (inline CASB). It has also added capabilities, including an integrated next-generation firewall (NGFW), cloud SWG and Netskope Private Access, to position itself as a SASE competitor. Netskope delivers these capabilities from a single platform with a single management console, which is essential to the SASE vision.

Netskope delivers its service from data centers in 50-plus regions via its NewEdge private cloud, with each data center providing all service features. (Some SASE players, such as Zscaler, only deliver certain capabilities from certain data centers.) Netskope manages these data centers itself rather than using public cloud vendors. This management approach is superior because it not only indicates a true multi-tenant service, but enables complete control over data center expansion, getting the service closer to users in regions that matter to customers and prospects.

While Netskope…

Source…

Apple vs. Android: Mobile Security Pros and Cons – eSecurity Planet

Apple vs. Android: Mobile Security Pros and Cons
eSecurity Planet
Android's security vulnerabilities and the sheer variations of devices and permutations of the platform and associated software created the need for Host Card Emulation (HCE), a software-based, self-sufficient and protected solution for mobile payments

and more »

“android security” – read more