HTC: Rendered Worthless By Insecurity?

87648734.jpg?x=648&y=329&infer_y=1

Fingerprint biometrics unencrypred: attackers can sit in the background and collect the fingerprint image of every victim.

Internet hyperbole (and financial analysis) has rendered HTC, a once high-flying mobile brand, essentially valueless.

In short, the company is trading below cash on hand. So if you bought all HTC stock, the company would have to pay you, the buyer, to take it over. This means the company’s factories, stock and brand are worth nothing, at least on Wall Street.

Furthermore, the researchers have discovered that the HTC One Max has been keeping fingerprint biometrics used to unlock the cellphones in an unencrypted “world-readable” file, a definite no-no in the world of security. Hackers could easily open the file /data/dbgraw.bmp on the phone’s memory and capture your fingerprint data.

It is clear that companies like HTC and Samsung are about to be hit by lower-end manufacturers right where it matters most: price. The profit on an average Android phone is about a penny. This means the only way to survive is by reducing the price of a phone as much as possible. However, the modern phone marketers like Samsung and HTC only want to sell flagships – big, tent-pole phones that lend themselves to big marketing budgets and fancy commercials.

There is no perceived upside in flogging the cheapest of the cheap, especially considering the “fanciest” phone out there is the iPhone. When your only competitor is also ostensibly the most expensive phone on the market, there is little value in highlighting your cheapest models.

When HTC first began selling its own phones in about 2006, the market was wildly striated. There was a solid base of “free” phones running a Java stack that offered little more than a keypad and a contact list.
In the mid-range were clever feature phones like the HTC Wizard and Samsung Blackjack that appeared every few months and were aimed at a general “upgrader” class of user who wanted little more than to have the latest cell phone.
Finally, there were the luxury phones like the iPhone and a few Galaxy phones, as well as business-focused brands like BlackBerry and even LG with its crazy Prada phone. These price points allowed for a certain amount of cushion as cell phone newbies picked up cheap phones and the die-hards paid a premium for the good stuff.

Now it’s iPhone and everyone else. The cell phone buyer’s market is saturated. Even the upgrade cycles have grown longer. In short, people are holding onto their expensive phones longer or buying wildly cheap ones. There is no middle ground.

HTC got hit with a one-two punch this week. The financial news and the security discovery are exactly the pieces of information that will further drive HTC’s stock price – and popularity – into the toilet. HTC might be able to pull a Motorola and partially pull out of the nosedive, but, knowing the market for the average cell phone, I’m not holding my breath. Too many cell phones and too little profit make for a really bad business.
Techcrunch: http://tcrn.ch/1gFUgrr

 

 

« US Internet Giants Join to Curb Child Sex Abuse
France & UK on the Edge of Kafkaesque Surveillance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

SecuriThings

SecuriThings

SecuriThings is a User and Entity Behavioral Analytics (UEBA) solution for IoT security.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.