@Smk I guess legit in the sense that they do provide the service they said they would... but the evil ones are the ones that charge you more or do it multiple times and then spam your phonebook looking for another sucker to click the link
I was scammed by a company which started sending me messages and something I did had the effect of applying a charge to my bill for each message I received! The charges were small but I eventually noticed them. Called the vendor who recognized the culprit instantly and refunded my money.
From the talk I was at this summer a lot of them hide the process so you don't know this is happening. But other "legit" examples are those commericals like send us two names and we will send you a text back with how compatiable they are romantically
Most of the SMS scams are basically designed to get you to unknowingly forward these premium rate messages. The charges are added to your mobile bill. Meanwhile the credit is given to the company and they get it all in a month and then distribute the digital currency and move onto a new account before the bills have arrived and the user knows this happens
One thing: IBM's report talks about how malware attacks smartphones through premium SMS services and some third-party "cheat" apps. So it seems there is a move to tempt users to adopt these apps. I guess consciousness needs to be raised.
I do have my first ever Kindle, Susan. Although I remain under the spell of Jeff B.'s salesmanship, I was really pointing out that warnings not to use mobile for shopping are futile. It's going to become mobile's main purpose after calls/messages.
@Susan: Agreed. Sometimes I actually enjoy shopping in brick and mortar space. That said, though, automating the process has its attractions, especially given lack of time and energy for "attacking" the mall.
I think enterprises need to balance the advantages of increased productivity from mobile use with the need for security and make a judgment. McAfee would say their internally held data either has probably been hacked already in any case.
I think I am past being surprised by the Pollyanna attitude to security. We're moving rapidly towards an environment where data is held by external server farms and accessed using a wide range of devices which have very open attack surfaces. Given the proven problems with locking down data held on internal, supposedly secure systems, of course we are heading for problems.
Anyway, none of this is truly surprising, is it? I think everyone foresaw that mobile would multiply the security problem once it escaped the Blackberry corral and opened itself to the WorldwideWeb. We just all went ahead anyway. Security will have to play catch-up as usual.
I've seen a lot of indication that security is having to change itself from a more local internal effort to a more distrubutied effort as workers continue to scatter, but even thing as consumerization continues the enterpirse has even less control :(
@Mary, I'm not sure how behavior monitoring could be implemented. I guess it's the equivalent of banks suspending use of cards when aberrant activity is identified. Not sure how that would work for mobile devices.
Big-data and analytics tools enable marketers to understand customers as individuals, identifying unmet needs and addressing each customer as a "segment of one," says John Kennedy, VP corporate marketing, IBM.
The whole Amazon.reader debate is a double-stupid. It's stupid to think that there's any e-book buyer who doesn't know Amazon's URL, and it was stupider to let ICANN launch the whole free-form TLD initiative to start with.
Enterprises would like to move to cloud computing but are hesitant because they are concerned about providers’ ability to secure company data. Here are some tips that help to ensure that if breaches occur, the business is not left holding the bag.
Edmunds separates customers into segments based on the info it collects on its site and from partners, and uses that to push out custom content, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?