HTC: Rendered Worthless By Insecurity?

87648734.jpg?x=648&y=329&infer_y=1

Fingerprint biometrics unencrypred: attackers can sit in the background and collect the fingerprint image of every victim.

Internet hyperbole (and financial analysis) has rendered HTC, a once high-flying mobile brand, essentially valueless.

In short, the company is trading below cash on hand. So if you bought all HTC stock, the company would have to pay you, the buyer, to take it over. This means the company’s factories, stock and brand are worth nothing, at least on Wall Street.

Furthermore, the researchers have discovered that the HTC One Max has been keeping fingerprint biometrics used to unlock the cellphones in an unencrypted “world-readable” file, a definite no-no in the world of security. Hackers could easily open the file /data/dbgraw.bmp on the phone’s memory and capture your fingerprint data.

It is clear that companies like HTC and Samsung are about to be hit by lower-end manufacturers right where it matters most: price. The profit on an average Android phone is about a penny. This means the only way to survive is by reducing the price of a phone as much as possible. However, the modern phone marketers like Samsung and HTC only want to sell flagships – big, tent-pole phones that lend themselves to big marketing budgets and fancy commercials.

There is no perceived upside in flogging the cheapest of the cheap, especially considering the “fanciest” phone out there is the iPhone. When your only competitor is also ostensibly the most expensive phone on the market, there is little value in highlighting your cheapest models.

When HTC first began selling its own phones in about 2006, the market was wildly striated. There was a solid base of “free” phones running a Java stack that offered little more than a keypad and a contact list.
In the mid-range were clever feature phones like the HTC Wizard and Samsung Blackjack that appeared every few months and were aimed at a general “upgrader” class of user who wanted little more than to have the latest cell phone.
Finally, there were the luxury phones like the iPhone and a few Galaxy phones, as well as business-focused brands like BlackBerry and even LG with its crazy Prada phone. These price points allowed for a certain amount of cushion as cell phone newbies picked up cheap phones and the die-hards paid a premium for the good stuff.

Now it’s iPhone and everyone else. The cell phone buyer’s market is saturated. Even the upgrade cycles have grown longer. In short, people are holding onto their expensive phones longer or buying wildly cheap ones. There is no middle ground.

HTC got hit with a one-two punch this week. The financial news and the security discovery are exactly the pieces of information that will further drive HTC’s stock price – and popularity – into the toilet. HTC might be able to pull a Motorola and partially pull out of the nosedive, but, knowing the market for the average cell phone, I’m not holding my breath. Too many cell phones and too little profit make for a really bad business.
Techcrunch: http://tcrn.ch/1gFUgrr

 

 

« US Internet Giants Join to Curb Child Sex Abuse
France & UK on the Edge of Kafkaesque Surveillance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.