{"id":47987,"date":"2016-03-03T10:41:19","date_gmt":"2016-03-03T18:41:19","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=47987"},"modified":"2025-05-27T20:03:16","modified_gmt":"2025-05-28T03:03:16","slug":"a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/","title":{"rendered":"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress"},"content":{"rendered":"<p>More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what the future has in store for \u201cmobile.\u201d<\/p>\n<p>After four days at the event, what became obvious to me is that we have certainly progressed from the days when a mobile phone was capable only of making calls, sending SMS messages, and playing the occasional game of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Snake_(video_game)\">Snake<\/a>. The exhibition hall was packed full of companies showcasing the latest smartphone capabilities and Internet-connected devices that look to make mobile devices even more central to the way we live our lives. In fact, we can now use our phones to unlock car doors, control the heating in our homes, and monitor our health, all while on the move. What excited many industry experts, however, was <a href=\"http:\/\/www.cnet.com\/news\/virtual-reality-facebook-zuckerberg-steals-mobile-world-congress-smartphones-phones-vr-oculus-gear\/\">virtual reality<\/a>. It seems everyone was talking about it (as you can see from the word cloud, below). LG, HTC, and Facebook (to name just a few) made noise about their virtual reality products and <a href=\"http:\/\/www.ibtimes.co.uk\/mwc-2016-mark-zuckerberg-talks-virtual-reality-samsung-s7-launch-1545169\">Samsung<\/a> even had its own virtual theater, allowing visitors to try their hands at snowboarding.<\/p>\n<p>What was undoubtedly clear from MWC, then, is that future mobile technologies will go far beyond a smartphone. Companies, both well-known and those making a name for themselves, were keen to use the event to showcase just what experiences they are capable of delivering to their customers beyond a call, text, or casual Internet surf.<\/p>\n<p>The networks supporting these devices, for example, was a much discussed topic, with 5G taking center stage. Although this side of MWC tends to slip under the radar, many industry experts believe the rise of the Internet of Things will truly be successful only with the introduction of 5G. As such, the work going into the building of networks that can support the connected world was a hotly discussed topic\u2014showing the sheer scale to which this mobile ecosystem is growing.<\/p>\n<h2>Latest Mobile Threat Report<\/h2>\n<p>Evidently from MWC, 2016 is going to be an exciting year for innovation in mobile\u2014one that it is going to excite consumers and pave the way for the connected world. But for this to be a success, we need to first and foremost address security. We know that where consumers go, criminals go too. And we only have to look at the figures to see that they are going to mobile devices: Our latest <em>Mobile Threat Report<\/em> found that 37 million mobile malware have been detected during the last six months.<\/p>\n<p>Of course, the criminals are not after the devices. They want the valuable data. Facebook\u2019s Mark Zuckerberg said in his keynote said that virtual reality will provide another level of tailored and emotional connection for brands and consumers alike, given the huge amount of personal data collected on the headset. But what happens when this data falls into the wrong hands? Today, unfortunately, it\u2019s not a question of \u201cif\u201d but \u201cwhen.\u201d<\/p>\n<p>In a world of 5G hyperconnectivity, in which more data gathering and devices will become more ingrained in our personal and professional lives, trusting the access given to personal information will be crucial. We need to do more today to set the stage. We need to first get right the <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/anyone-really-care-mobile-security\/\">security basics <\/a>and establish that foundation of trust so that companies can deliver on the promises we\u2019ve seen at MWC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss&#8230;<\/p>\n","protected":false},"author":460,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,4131,214],"coauthors":[1359],"class_list":["post-47987","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-internet-of-things","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress | McAfee Blog<\/title>\n<meta name=\"description\" content=\"More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-03T18:41:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:03:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2016-03-03-Raj-MWC.jpg\" \/>\n<meta name=\"author\" content=\"Raj Samani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@raj_samani\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raj Samani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/\"},\"author\":{\"name\":\"Raj Samani\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc\"},\"headline\":\"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress\",\"datePublished\":\"2016-03-03T18:41:19+00:00\",\"dateModified\":\"2025-05-28T03:03:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/\"},\"wordCount\":574,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"cybercrime\",\"Internet of Things\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/\",\"name\":\"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-03-03T18:41:19+00:00\",\"dateModified\":\"2025-05-28T03:03:16+00:00\",\"description\":\"More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc\",\"name\":\"Raj Samani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/84322977b2e4d74026259dbee600b443\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png\",\"caption\":\"Raj Samani\"},\"description\":\"Raj Samani is Chief Scientist and Fellow for the Enterprise business. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the co-author of the book \\\"Applied Cyber Security and the Smart Grid\\\" and the \\\"CSA Guide to Cloud Computing,\\\" as well as technical editor for numerous other publications.\",\"sameAs\":[\"http:\/\/www.mcafee.com\/\",\"https:\/\/www.linkedin.com\/in\/raj-samani-3697b9\/\",\"https:\/\/x.com\/raj_samani\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress | McAfee Blog","description":"More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress | McAfee Blog","og_description":"More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-03-03T18:41:19+00:00","article_modified_time":"2025-05-28T03:03:16+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2016-03-03-Raj-MWC.jpg","type":"","width":"","height":""}],"author":"Raj Samani","twitter_card":"summary_large_image","twitter_creator":"@raj_samani","twitter_site":"@McAfee","twitter_misc":{"Written by":"Raj Samani","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/"},"author":{"name":"Raj Samani","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc"},"headline":"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress","datePublished":"2016-03-03T18:41:19+00:00","dateModified":"2025-05-28T03:03:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/"},"wordCount":574,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","cybercrime","Internet of Things","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/","name":"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-03-03T18:41:19+00:00","dateModified":"2025-05-28T03:03:16+00:00","description":"More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss and share their views of what","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/a-future-beyond-mobile-devices-trusting-the-promises-of-mobile-world-congress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c599d4c6fbfe639ab3c623dbab743efc","name":"Raj Samani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/84322977b2e4d74026259dbee600b443","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/Picture1-1-96x96.png","caption":"Raj Samani"},"description":"Raj Samani is Chief Scientist and Fellow for the Enterprise business. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Samani has been recognized for his contribution to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, and Intel Achievement Award, among others. He is the co-author of the book \"Applied Cyber Security and the Smart Grid\" and the \"CSA Guide to Cloud Computing,\" as well as technical editor for numerous other publications.","sameAs":["http:\/\/www.mcafee.com\/","https:\/\/www.linkedin.com\/in\/raj-samani-3697b9\/","https:\/\/x.com\/raj_samani"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/460"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=47987"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47987\/revisions"}],"predecessor-version":[{"id":214484,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47987\/revisions\/214484"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=47987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=47987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=47987"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=47987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}