Tag Archive for Mobile

Blackberry is Dead – Long Live Blackberry

Blackberry is Dead - Long Live BlackberryLast week BlackBerry (BB) tweeted that they were letting their agreement with the Chinese electronics group TCL Communication lapse at the end of August 2020. This most likely is the end of the BlackBerry smartphone. TCL had been manufacturing BlackBerry smartphones since the Canadian company stopped making its name-sake phones in 2016 amid an attempt to re-shape itself into a cyber-security company.

BlackBerry’s preceded the iPhone and Android in important ways. How did the Blackberry phone go from world domination to last week’s announcement?

Blackberry history

March 1984: Research in Motion (RIM) was founded in Canada.

October 1997: RIM went public with an IPO on the Toronto Stock Exchange which raised $115 million.

July 1998: The RIM 850 the initial BlackBerry device offered something all its competitors couldn’t touch at the time – access to emails on the go (no voice).

1999: RIM joined NASDAQ as RIMM.

November 2001: Patent holding company NTP sued RIM for patent infringement RIM lost and was forced to settle for $612.5M in 2006.

March 2002: BlackBerry 5810 released, with both voice and data support. It ran on a 2G network and came with a color screen. It became the device of choice in corporate America due to its enterprise-level security.

BlackBerry Messenger2005:  RIM launched a proprietary mobile instant-messaging application BlackBerry Messenger. BBM came at a time when other mobile messaging options — like SMS messages — were subpar.

March 2007: The company “restated” $250M earnings relating to a “backdating” stock options scandal. RIM executives changed the date of stock sales to a low share price date to make money on their stock options. The scandal cost RIM’s co-CEOs Balsillie and Lazaridis and others their jobs at RIM and a total of C$77M in fines.

January 2007: Apple launched its first iPhone, opening the market to full touch screen phones.

January 2007 Apple launched its first iPhone,June 2007: BlackBerry had some 8 million customers.

October 2008: First Android-powered smartphone is released.

November 2008: BlackBerry launched the ill-fated Storm, its first full touch phone in reaction to iPhone.

September 2009: BlackBerry hits 20.7% worldwide smartphone market share in Q3. iPhone is at 17.1% and Android at 3.5%.

April 2010: Apple released the original iPad.

April 2011: RIM released the PlayBook tablet as a knee-jerk reaction to the success of the Apple iPad. Contributing to the PlayBook’s poor sales was the dumb decision to not offer email services without a BlackBerry smartphone.

July 2011: 10% of RIM workforce (2,000 workers) laid off.

October 2011: RIM had a global failure of its infrastructure – users are left without service for four days (Oct 10-13).

June 2012 RIM announces 5,000 layoffsJune 2012: RIM announced 5,000 layoffs.

January 2013: The company changed its name from Research in Motion to Blackberry and goes from RIMM to BBRY on the NASDAQ.

September 2013: BlackBerry peaked with 79 million global users and 4,500 employees are laid-off (40% of staff).

November 2013: John Chen becomes CEO and starts to pivot BBRY from a phone maker to a security firm.

September 2015: BlackBerry launched the Priv, the first Android-powered BlackBerry smartphone. BlackBerry acquired mobile security provider Good Technology for $425M and integrated it into the BlackBerry Enterprise Mobility Suite, for its enterprise customers.

September 2016: Blackberry becomes Blackberry Limited and stops making smartphones and outsource all hardware development and manufacturing.

BlackBerry users plummets to 11 million.May 2017: The number of BlackBerry users plummets from 80 million to 11 million.

October 2017: BlackBerry Ltd moved from NASDAQ as BBRY to BB on the NYSE.

November 2018: BlackBerry Limited purchased security firm Cylance for $1.4B.

May 2019: BBM for consumers is shut down.

The Blackberry Limited tweet marks the end of a line of devices that revolutionized mobile productivity for the enterprise. For the uninitiated (those under 30) in its heyday, Blackberry set the bar for mobile innovation. BlackBerry smartphones or “crackberries” as many referred to them helped set the stage for many of the mobile features we rely on today.

Blackberry Curve_8320The company made its own hardware which included a QWERTY keyboard. Qwerty keyboards that made it easier to fire off emails and instant messages. BlackBerry smartphones were the best way to stay connected without a laptop.

BlackBerry Mobile Services provided business users with quick encrypted end-to-end email over a low bandwidth connection. BMS also provided users access to not only their contacts, calendar, and email, but connected enterprise apps and data.

Back in the day when I was sharing technical services we even stood up a Blackberry Enterprise Server (BES) for our customers to link their BBeries to Exchange. BES was sold as a highly secure BES platform that ensured the content was always encrypted and uncrackable.

Holger Mueller, the principal analyst at Constellation Research, pointed out to TargetTech the irony of BlackBerry’s fall.

That’s the irony — users and CIOs got rid of [their] BlackBerrys despite email volume being up … Business users went from being productive on the go to [becoming] lurkers and [doing] email at night.

Tuong Nguyen, a senior principal analyst at Gartner, told TargetTech the BlackBerry smartphone relevance disappeared well before this week’s announcement.

By the time the company stopped making its own phones, its global smartphone market share was well under 1% .. In fact, they had started dipping under the 1% threshold [around] 2013-2014.

rb-

I think the market has space for a productivity-oriented company that respects its users. But to unseat Apple, that firm would have to excel at something else, like folding screens, projection, AR/VR.

Why Blackberry phones are deadThe original BlackBerry company — BlackBerry Limited — now focuses on security software. This is ironic since the Snowden papers revealed that the NSA has access to user data on BlackBerry devices.

In the end BlackBerry, just like Nokia, Palm and Microsoft underestimated the challenge from Apple  Perhaps BlackBerry needs to be done with phones.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Scary SS7 Flaw Strikes Banks

Scary SS7 Flaw Strikes BanksLost in last month’s hubbub over WannaCry ransomware was the revelation that hackers had successfully exploited the SS7 “flaw” in January 2017. In May reports surfaced that hackers were able to remotely pilfer German bank accounts by taking advantage of vulnerabilities in Signaling System 7 (SS7). SS7 is a standard that defines how the public phone system talks to itself to complete a phone call.

Signaling System 7 is a standard that defines how the public phone system talks to itself to complete a phone call.The high-tech heist was initially reported by the German newspaper Süddeutsche Zeitung (auf Deutsch). The attack was a sophisticated operation that combined targeted phishing emails and SS7 exploits to bypass two-factor authentication (2FA) protection. This is the first publicly known exploit of SS7 to intercept two-factor authentication codes sent by a bank to confirm actions taken by online banking customers.

How hackers get in

According to ars Technica, the attack began with traditional bank-fraud trojans. These trojans infect account holders’ computers and steal the passwords used to log in to bank accounts. From there, attackers could view account balances, but were prevented from making transfers without the one-time password the bank sent as a text message. After stealing the necessary login details via phishing emails, the perpetrators leveraged the SS7 flaw to intercept the associated mTAN (mobile transaction authentication numbers) authentication codes sent to the victims — messages notifying them of account activity — to validate the transactions and remain hidden, investigators say.

Central office equipmentGerman Telecommunications giant O2-Telefonica confirmed details of the SS7-based cyberattacks to the newspaper. Ars says, in the past, attackers have obtained mTANs by obtaining a duplicate SIM card that allows them to take control of the bank customer’s phone number. SS7-facilitated compromises, by contrast, can be done remotely on a much larger quantity of phone numbers.

O2 Telefonica confirmed to Help Net Security that the attackers were able to gain access to the network of a foreign mobile network operator in January 2017. The attackers likely purchased access to the foreign telecommunications provider – this can apparently be done for less than 1,000 euros – and have set up a call and SMS forwarding.

Two-factor authentication

Ford Road CO in Dearborn Mi is the Oregon officeTwo-factor authentication (2FA) is a security process in which the user provides two authentication factors to verify they are who they say they are.  2FA provides an extra layer of security and makes it harder for attackers to gain access to a person’s devices and online accounts because knowing the victim’s password alone is not enough to pass the authentication check. Two-factor authentication has long been used to control access to sensitive systems and data, and online services are increasingly introducing 2FA to prevent their users’ data from being accessed by hackers who have stolen a password database or used phishing campaigns to get users’ passwords.

News of the incident prompted widespread concern online. Security advocates railed against the popular and continuous use of text messages to authenticate account information while growing evidence suggests that SS7 is an unsafe channel to deliver such data. Security experts told ars that the same SS7-centric hacking techniques used against German banks will become increasingly prevalent in the future, forcing organizations to reconsider how they authenticate user activity.

The end of 2FA?

Cris Thomas, a strategist at Tenable Network Security warns in the article:

While this is not the end of 2FA, it may be the end of 2FA over SS7, which comprises a majority of 2FA systems … Vulnerabilities in SS7 and other cellular protocols aren’t new. They have been presented at security conferences for years … there are other more secure protocols available now that systems can switch to…

Cybersecurity researchers began issuing warnings about this flaw in late 2014 about dangerous flaws in SS7. I wrote about the SS7 flaw in September of 2016  and in March 2107. Maybe this will be the wake-up call for the carriers. One industry insider quipped:

This latest attack serves as a warning to the mobile community about what is at stake if these loopholes aren’t closed … The industry at large needs to go beyond simple measures such as two-factor authentication, to protect mobile users and their data, and invest in more sophisticated mobile security.

SS7 allows voice networks to interoperate

a man-in-the-middle attack In 2014 security researchers first demonstrated that SS7 could be exploited to track and eavesdrop on cell phones. This new attack is essentially a man-in-the-middle attack on cell phone communications. It exploits the lack of authentication in the communication protocols that run on top of SS7.

Developed in 1975, today, over 800 telecommunications companies around the world, including AT&T (T) and Verizon (VZ), use  This technology has not kept up with modern times.  In May 2017, Wired published an article that explains some of the ways to secure SS7. Overcoming SS7 insecurity requires implementing a series of firewalls and filters that can stop the attacks. Researchers Wired spoke to suggest that adding encryption to SS7 would shield network traffic from prying eyes and bolster authentication. Both of these changes are unpopular with the carriers because they cost money and can impact the network core, so don’t expect any network changes to address the SS7 flaw anytime soon.

Carriers should use SS7 firewall to secure the SS7 networkThe Register reports that the FCC’s Communications Security, Reliability and Interoperability Council found that the proposed replacement for SS7 on 5G networks, dubbed the Diameter protocol has security holes too.

In March 2017, Oregon Sen. Ron Wyden and California Rep. Ted Lieu sent a letter to Homeland Security’s John Kelly requesting that DHS investigate and provide information about the impact of SS7 vulnerabilities to U.S. companies and governmental agencies. Kelly has not responded to the letter, according to the Wired article.

Of course, the TLA’s would never use this “flaw” in SS7 to spy on us.

What can you do?

The Guardian says that given that the SS7 vulnerabilities reside on systems outside of your control, there is very little you can do to protect yourself beyond not using the services.

PoliticanThey recommend for text messages, avoiding SMS instead of using encrypted messaging services such as Apple’s (AAPL) iMessage, Facebook‘s (FB) WhatsApp or the many others available will allow you to send and receive instant messages without having to go through the SMS network to protect your messages from surveillance.

For calls, the Guardian recommends using a service that carries voice over data and not through the voice network. This will help prevent your calls from being snooped on. Messaging services including WhatsApp permit calls. Silent Circle’s end-to-end encrypted Phone service or the open-source Signal app also allows secure voice communications.

Your location could be being tracked at any stage when you have your mobile phone on. The only way to avoid it is to turn off your phone or turn off its connection to the mobile phone network and rely on Wi-Fi instead.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What You Need To Know About Germs on Your Cell

What You Need To Know About Germs on Your CellOver 2.6 billion Americans now have a cell phone. And they are walking around with some nasty stuff on their phones. I’m not talking about porn or malware but real viruses. An article by Caroline Kee and Taylor Miller at Buzzfeed found that most phones are covered with some pretty scary germs.

Swab cell phones for germsThe author took swabs of people’s cell phones to prove the point. Ms. Kee shared her swabs with Dr. Susan Whittier from Columbia University. They found that all phones had germs, bacteria, protozoa, viruses, and fungi on them, some of which are good for us and some of which are bad for us. The tests revealed that most phones had five kinds of harmless germs from the skin, mouth, nose, and environment.

Staphylococcus epidermidis (not aureus): Dr. Whittier says if you were to just swab your skin, this is what you’d find. It is normal and would get on the phone from regular daily use, like touching or talking on it.

All phones had germs, bacteria, protozoa, viruses, and fungi on themMicrococcus: Dr. Whittier says this makes up the normal skin flora, especially on the face. Everyone has different skin bacteria; it depends on the person. It can get on your phone if you touch your face a lot or talk on it often.

Streptococcus viridians: This bug lives in the mouth and throat, so it can get on your phone from talking, your fingers after touching your lips, coughing, etc. It’s usually harmless, but it can also cause infections in vulnerable people.

Moraxella: This is from sinuses, and it’s often found in people with recurrent sinusitis or post-nasal drip. In high levels, it can cause inner ear and bloodstream infections. It’s still a pretty normal thing to find on a phone.

25,000 germs on a cell phoneBacillus: Bacillus is a common bacteria from the environment, so it’s basically a sign that you’ve been outdoors. A lot of Bacillus means the phone is super dirty.

The bad news is that pathogens – potentially disease-causing strains of bacteria – were found on some of the phones tested. This is alarming. Think – salmonella, Ebola, bird flu, etc.

The most dangerous bug found on a phone was MRSA. MRSA, the flesh-eating bacteria, is a Staphylococcus aureus bacteria that is resistant to many antibiotics, including methicillin. It can cause serious infections in the skin and internal organs and can be fatal in vulnerable people. MRSA can spread easily between people and surfaces—often in health care settings, but it can also live on surfaces like subway handles, doorknobs, community bathrooms, showers, and especially gyms.

MRSA, the flesh eating bacteriaColumbia’s Whittier explained, “It’s a little worrisome for a phone to test positive for MRSA because it isn’t part of our normal flora.” We also know that MRSA loves to lurk on gym equipment and locker rooms, so it’s not completely abnormal to have it on your phone. About half the population carries Staph aureus with no problems. But this also makes it easy to spread between people and causes disease. Dr. Whittier warns that if Staph aureus gets into an open wound, it can cause major skin and blood infections, which can result in boils, food poisoning, toxic shock syndrome, and even death.

Poop. You’ve heard of E. coli. E. coli outbreaks have shut down restaurants like Chipotle and have caused many supermarket foods recalls. It was found on mobile phones. It’s a fecal organism, so it’s usually found in poop, but it can also live in the gastrointestinal tract along with other gut bacteria. Buzzfeed reports there are different types of E. coli, and some strains are way more pathogenic than others.  E. coli has the potential to cause serious food poisoning and even death.

E.Coli bacteria

E. coli infections spread through the fecal-oral route. You will get sick if you touch your mouth with contaminated hands after using the bathroom or touching fecal matter. It turns out this is very common. In 2015, Verizon found that 90% of cell phone users use their mobile phones in the bathroom. A 2013 study by Michigan State University found that just 5% of people properly washed their hands after using the bathroom.

The Columbia MD warns this is why you shouldn’t bring your phone to the bathroom or use it while eating. E. coli on a phone could be from the person’s stool if they didn’t wash their hands or another person’s stool if the phone went into a public bathroom because fecal matter sprays everywhere when the toilet flushes

Dont bring your phone to the bathroomWhat to do? Even if you’re an avid hand-washer, your phone can still pick up germs all day. The Buzzfeed article makes two recommendations to keep your phone safe. Keep your mobile phone out of the bathroom (where gross stuff like Norovirus lurks). And don’t use your cell phone while you’re eating since that can transmit bacteria and viruses to your mouth and get you sick.

How can you keep those nasty bugs off your phone? The article recommends cleaning your phone once a week using this magical “phone soap.” It’s not actually soap — it’s a charger box that shoots out UV lights that “kill 99.9% of germs using UV rays” at Amazon.

rb-

Back in 2013, I wrote about dirty mobile phones spreading Ebola here.

Wash your handsThe advice from 2012 on how to disinfect your cell is still the same as in 2016. Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating. To remove fingerprints, wipe these surfaces with a soft, lint-free cloth. The ability of this coating to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Fake Fingerprints Can Open Your Phone

– Updated 03-30-2016 – The Business Insider proves that you can use Play-Doh to fool the fingerprint sensor in your Phone.

Fake Fingerprints Open GalaxyI have pointed out a number of times that biometrics will not be the complete final solution for passwords. Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. The technology is mainly used for identification and access control. The basic premise of biometric authentication is that everyone is unique. An individual can be identified by his or her intrinsic physical or behavioral traits.

Fake Fingerprints Can Open Your PhoneThere is a huge issue with biometrics.  You can’t change your intrinsic physical or behavioral traits if they get stolen or hacked. Well, now there is more proof that biometrics can be hacked without cutting off a finger.

Hack mobile phone authentication

Two smarty Sparty’s from Michigan State University’s biometrics group has figured out a way to hack mobile phone fingerprint authentication. According to Help Net Security, the MSU researchers can hack your secure phone by using just a scanner, a color inkjet printer, a special type of paper, and ink.

AgIC silver conductive ink cartridgesTurns out that the attack is easy to execute. The first step is to scan the target’s fingerprint image at 300 dpi or higher resolution. Then, the image is mirrored and the original or binarized fingerprint image is printed on the glossy side of an AgIC special paper. The printer uses AgIC silver conductive ink cartridges (along with normal black ink).

Magical conductive ink

CrunchBase explains that advances in material science have made it possible to manufacture almost magical conductive ink. AgIC silver conductive ink has tiny silver particles and can be purchased online. The ink is printed by standard Brother printers. The ink dries in a few seconds and conductivity emerges instantly when the traces are drawn on special photo inkjet printing paper also available online.

spoofed fingerprintAll in all, an attacker can have a spoofed fingerprint that would allow him to access a phone protected with fingerprint authentication in less than 15 minutes, and the cost of all the tools he needs to do this does not surpass $500.

Researchers Kai Cao and Anil Jain successfully managed to fool the fingerprint sensors on the Samsung (005930) Galaxy S6 and Huawei (002502) Hornor 7 phones.

They posted a demo of the attack on YouTube:

 

The attack is an improvement over Germany’s Chaos Computer Club’s attack against Apple (AAPL) Touch ID on iPhone 5S by lifting a fingerprint of the genuine user of a glass surface and then making a spoof fingerprint. More details about the Michigan State researchers’ work can be found here (PDF).

Only a matter of time

Starbucks app hackedThe Sparty researchers note that not all mobile phones can be hacked using this method. But their experiment is proof of the urgent need for anti-spoofing techniques for fingerprint recognition systems, especially for mobile devices which are being increasingly used as a part of two-factor authentication for site access and payment processing like Apple Pay, Google (GOOG) Pay, or Samsung Pay.

The researchers warn that it is only a matter of time before hackers develop improved hacking strategies not just for fingerprints, but other biometric traits that are being adopted for mobile phones (e.g., face, iris, and voice).

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Project Jacquard Puts a Touchpanel In Your Pants

Project Jacquard Puts a Touchpanel In Your PantsAt the recent Google I/O 2015 conference, they unwrapped Project Jacquard. With Project Jacquard (named for a kind of weaving that requires a special loom) Google (GOOG) is creating a sort of conductive yarn that can embed right into fabrics. The plan is to weave those threads into meshes, to create interactive clothing patches that can sense your touch, how hard you’re pressing on them, and even your hand’s position in space before it even makes contact with the fabric.

Project Jacquard teams with Levi’s

Google logoEngadget reports that during the Google ATAP address, Technical Program Lead Ivan Poupyrev confirmed that the search giant is teaming up with Levi’s to bring Jacquard’s technically complex fabrics to the world of fashion. He told the gathered Google groupies that the new tech is important to the Google future; “We want digital to be just the same thing as quality of yarn or colors used.

One video demo showed a person swiping across the length of their forearm to initiate a phone call on a nearby Nexus 6. Engadget’s Chris Velazco says it is the seamlessness of behavior that’s got companies like Levi’s so worked up. Proponents of the tech claim it will reduce digital distractions caused by smartphones and smartwatches.

Improved safety claims

Levi's logoLevi Straus’s head of product innovation Paul Dillinger said that notion is what really caught the clothier’s imagination. Levi’s believes they can help reduce digital distractions through, “the clothes we love to interface with the digital world while maintaining eye with the people we’re having dinner with.”

According to Engadget’s Roberto Baldwin, the conductive surface uses low-power Wi-Fi to communicate with devices. While the demo was on a flat surface, the other electronics needed to power and connect the fabric to a device are not quite ready to be sewn into your pants. The team is still working on shrinking those components down to integrate with its loom. But once they do, you might be swiping your next jacket to control your smartphone.

rb-

Levi’s expects to release a pair of jeans with a touch panel in early 2016.

Fast Company cites predictions from Gartner that “smart garments” will become a regular part of our wardrobes. By 2016, smart garments should make up 26 million of the 91 million units shipped for wearables, vs. 19 million for wristbands. And it’s only going to get bigger from there.

Related articles
  • Google working with Levi’s to make smart clothes (msn.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.