{"id":47615,"date":"2016-02-17T06:00:06","date_gmt":"2016-02-17T14:00:06","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=47615"},"modified":"2025-05-27T22:20:57","modified_gmt":"2025-05-28T05:20:57","slug":"anyone-really-care-mobile-security","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/","title":{"rendered":"Does Anyone Really Care About Mobile Security?"},"content":{"rendered":"<p>I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone said \u201cmobile\u201d we thought of physical <a href=\"http:\/\/www.pocket-lint.com\/news\/132866-mwc-through-the-years-best-phones-of-the-last-12-shows\">handsets<\/a>; whereas the term today has a much more complex definition. \u201cMobile\u201d now is a reflection of the Internet of Things (IoT) and the hyperconnected world we live in.<\/p>\n<p>You only have to look at the thousands of connected devices presented at <a href=\"http:\/\/mashable.com\/2016\/01\/09\/ces-smart-gadgets\/\">CES<\/a>\u2014from wearables to smart refrigerators\u2014to see the extent to which IoT will soon be ingrained in our everyday lives. But with more devices come more threats. And security needs to take center stage if users are going to trust their devices, especially as that trust has been tainted in light of the numerous breaches last year of high-profile companies such as <a href=\"http:\/\/www.theguardian.com\/business\/2015\/nov\/06\/nearly-157000-had-data-breached-in-talktalk-cyber-attack\">TalkTalk<\/a> and <a href=\"http:\/\/www.itproportal.com\/2016\/01\/20\/from-ashley-madison-to-malware-to-the-rise-of-mobile-the-year-that-has-been-and-the-year-that-is-to-come\/\">Ashley Madison<\/a>. More users now demand to know their personal information cannot be compromised; we saw this shift when thousands of TalkTalk\u2019s customers went elsewhere after the breach.<\/p>\n<p>It\u2019s worrying that some companies have not gotten the memo. Just last week we learned that <a href=\"http:\/\/www.telegraph.co.uk\/technology\/2016\/02\/10\/vtech-says-it-is-not-responsible-for-security-after-hack-exposed\/\">VTech<\/a> had updated its terms and conditions, and what I read filled me with despair. Under the new terms, VTech says families using its software do so at their \u201cown risk.\u201d The company places the entire security burden on its customers, claiming it is not liable in the case of future attacks by asking its customers to <a href=\"http:\/\/www.theguardian.com\/technology\/2016\/feb\/10\/hacked-vtech-asks-users-agree-any-information-you-send-may-not-be-secure\">accept<\/a> that <em>\u201cany information you send or receive during your use of the site may not be secure and may be intercepted or later acquired by unauthorized parties.\u201d <\/em><\/p>\n<p>When the company was hacked last year, more than <a href=\"http:\/\/www.ibtimes.co.uk\/vtech-app-store-database-hack-affects-6-3-million-kids-worldwide-1531443\">6.3 million<\/a> children\u2019s accounts were compromised, with conversations, photos, and video messages between families exposed. Do you want to live in a world in which companies can get away with this responsibility shift while selling us connected devices for our homes and for our children? I know I don\u2019t. The implications of such a stance becoming the norm are worrying. Although the Information Commissioner\u2019s Office has stated that the responsibility of protecting data does lie with the manufacturer, I question whether market pressure (customers) will demand better security.<\/p>\n<p>Organizations have a duty to care for their customers. If the consumers companies want to reach are ever going to fully adopt these technologies, trust between the two parties will have to evolve.<\/p>\n<h2>On The Mobile World Congress<\/h2>\n<p>This Mobile World Congress, we will be exposed to a world of exciting new technologies and opportunities as we move into an even more connected future. But as we acknowledge the move beyond the traditional handset to the new generation of digital devices, we need to address the issues around privacy, security, and control that come with them. As connected devices become more common and essential to our lives, security basics need to be the priority, right from the start. Without first establishing a foundation of trust, the exciting prospect of 5G and the wider future of IoT will fundamentally fail.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show&#8230;<\/p>\n","protected":false},"author":460,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,4131,214],"coauthors":[1359],"class_list":["post-47615","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-internet-of-things","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Does Anyone Really Care About Mobile Security? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does Anyone Really Care About Mobile Security? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-17T14:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:20:57+00:00\" \/>\n<meta name=\"author\" content=\"Raj Samani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@raj_samani\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raj Samani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/\"},\"author\":{\"name\":\"Raj Samani\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc\"},\"headline\":\"Does Anyone Really Care About Mobile Security?\",\"datePublished\":\"2016-02-17T14:00:06+00:00\",\"dateModified\":\"2025-05-28T05:20:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"cybercrime\",\"Internet of Things\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/\",\"name\":\"Does Anyone Really Care About Mobile Security? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-02-17T14:00:06+00:00\",\"dateModified\":\"2025-05-28T05:20:57+00:00\",\"description\":\"I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Does Anyone Really Care About Mobile Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc\",\"name\":\"Raj Samani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/84322977b2e4d74026259dbee600b443\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png\",\"caption\":\"Raj Samani\"},\"description\":\"Raj Samani is Chief Scientist and Fellow for the Enterprise business. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the co-author of the book \\\"Applied Cyber Security and the Smart Grid\\\" and the \\\"CSA Guide to Cloud Computing,\\\" as well as technical editor for numerous other publications.\",\"sameAs\":[\"http:\/\/www.mcafee.com\/\",\"https:\/\/www.linkedin.com\/in\/raj-samani-3697b9\/\",\"https:\/\/x.com\/raj_samani\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Does Anyone Really Care About Mobile Security? | McAfee Blog","description":"I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Does Anyone Really Care About Mobile Security? | McAfee Blog","og_description":"I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-02-17T14:00:06+00:00","article_modified_time":"2025-05-28T05:20:57+00:00","author":"Raj Samani","twitter_card":"summary_large_image","twitter_creator":"@raj_samani","twitter_site":"@McAfee","twitter_misc":{"Written by":"Raj Samani","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/"},"author":{"name":"Raj Samani","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc"},"headline":"Does Anyone Really Care About Mobile Security?","datePublished":"2016-02-17T14:00:06+00:00","dateModified":"2025-05-28T05:20:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/"},"wordCount":518,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","cybercrime","Internet of Things","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/","name":"Does Anyone Really Care About Mobile Security? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-02-17T14:00:06+00:00","dateModified":"2025-05-28T05:20:57+00:00","description":"I\u2019ve attended Mobile World Congress a number of times and it is fair to say the concept of the show has evolved over the years. Previously, when someone","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/anyone-really-care-mobile-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Does Anyone Really Care About Mobile Security?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc","name":"Raj Samani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/84322977b2e4d74026259dbee600b443","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png","caption":"Raj Samani"},"description":"Raj Samani is Chief Scientist and Fellow for the Enterprise business. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the co-author of the book \"Applied Cyber Security and the Smart Grid\" and the \"CSA Guide to Cloud Computing,\" as well as technical editor for numerous other publications.","sameAs":["http:\/\/www.mcafee.com\/","https:\/\/www.linkedin.com\/in\/raj-samani-3697b9\/","https:\/\/x.com\/raj_samani"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/460"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=47615"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47615\/revisions"}],"predecessor-version":[{"id":214550,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47615\/revisions\/214550"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=47615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=47615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=47615"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=47615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}