Feeds

Mobile monsters make m-commerce world domination bid

The numbers stack up

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Mobile phone behemoths Nokia, Ericsson and Motorola have joined forces to develop what they hope will become the de facto standard for secure mobile electronic transactions. The companies believe the move will create a huge demand for new mobile phones offering secure e-commerce for transactions such as banking, buying train and plane tickets, paying for parking and ordering products over the Internet. In an alarmingly-short time, even by the mad standards of the mobile phone industry, they plan to publish a draft of their security plan (as soon as next month). The trio will then invite other industry players to participate in the finalisation of an open standard before the summer. In typically bullish mood, the telephonic triumvirate claims that in three years' time, more people will be accessing the Web by phone than by PC. "Our ambition is to formulate an environment which allows mobile operators, financial institutions, and other service providers to facilitate secure electronic transactions," said Jan Ahrenbring, VP of Marketing and Communications at Ericsson. "We estimate that by 2004 there will be around one billion users of mobile telephony and some 600 million mobile Internet subscribers worldwide. "The most important thing needed to get all these consumers to start using mobile e-commerce is a standard that makes it safe and easy to use." Acronym alert The phone makers say their new standard will incorporate WAP, Bluetooth, WIM (Wireless Identification Module), PKI (Public Key Technologies) and WTLS (Wireless Transport Layer Security) technology, as well as the mobile payment schemes already in use. Products could be with us as early as next year, they claim, which will be capable of replacing wallets, ID cards, credit cards and cash. This will obviously make things a lot easier for criminals who will now only need to steal one item per mugging. ® Related stories Wap throws up latest bunch of gazillionaires Don't believe the m-commerce hype Text me, Cindy (my Bluetooth baby) The future is bright, the future is wireless

Choosing a cloud hosting partner with confidence

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.