Welcome!

IoT User Interface Authors: Lori MacVittie, Xenia von Wedel, Carmen Gonzalez, Elizabeth White, Liz McMillan

News Feed Item

National Study Indicates Mobile Spam Is Impacting the Vast Majority of U.S. Adults

“Mobile spam” has become prevalent, with the majority of U.S. adults who text reporting that they have received an unsolicited text message, according to a survey conducted online by Harris Interactive on behalf of Cloudmark among 2,475 U.S. adults aged 18 and older, of whom 1,801 were identified as texters. Many U.S. adults who text are also not aware of the most appropriate response to unsolicited messages.

The survey determined awareness of, interaction with and perceptions of “text message spam.” An infographic summarizing the study’s findings is also available.

Findings from the survey include:

  • Most U.S. adults (72 percent) use their mobile phone to send and receive text messages
  • 72 percent of have received an unsolicited texted message
  • 60 percent of those who send/receive texts received “mobile spam” within the last twelve months
  • 13 percent of U.S. adults who received an unsolicited text message clicked on a link in the message
  • 9 percent of U.S. adults who received an unsolicited text message called a number provided in the message

Additional Key Findings:

Younger Adults Are More Vulnerable to Spam

The likelihood of engaging in risky behavior in response to unsolicited text messages dramatically increases among younger people. Of those who received unsolicited text messages, 20 percent between the ages of 18-34 have clicked on a link in an unsolicited text message, compared with 7 percent of those 55 and over. Additionally, 16 percent of those ages 18-34 have called a number in an unsolicited text message versus 3 percent of those ages 55 and over.

Uncertainty Surrounds Proper Procedures for Reporting Mobile Spam

A majority of U.S. adults who send/receive texts – 64 percent – said it was important or very important that their carrier have a mechanism in place to report mobile spam. However, 72 percent reported that they were unsure if their carrier had such a process in place.

Furthermore, 41 percent of mobile users who send/receive texts reported they would text “Stop” in response to an unsolicited text message. However, by acknowledging spam messages, these individuals may unwittingly validate their phone number for malicious senders, opening themselves up for additional spam messages.

Reporting Service Helps Consumers Combat Spam

One avenue for reporting text message spam is the GSMA Spam Reporting Service. Consumers can submit suspicious texts to this service by forwarding the message to “7726” (S-P-A-M) for analysis. Powered by Cloudmark, the service provides participating carriers with comprehensive reports that include detailed information on spam content, senders and reporters, which carriers can utilize to block numbers, helping to reduce further spam. Some of the largest carriers in North America, including AT&T, Bell Mobility, Sprint, T-Mobile and Verizon Wireless, offer the service to their customers.

“With the rising popularity of text messaging, U.S. consumers of all ages are susceptible to receiving unwanted text messages, leaving them personally vulnerable to future security threats. Spammers are constantly searching for new ways to catch consumers off guard,” said Neil Cook, CTO, Cloudmark. “There is a tremendous opportunity to help consumers learn how to effectively combat spam and utilize the resources their mobile providers offer. Cloudmark is committed to helping carriers and mobile providers to ensure the security of their services, protecting users from mobile security threats and enhancing the overall user experience.”

To view an infographic that highlights key findings from the U.S. survey, please visit: http://www.cloudmark.com/releases/docs/mobile_spam_US_ver_3.jpg.

Survey Methodology

This survey was conducted online within the United States by Harris Interactive on behalf of Cloudmark from Sept 25-27, 2012 among 2,475 adults ages 18 and older (among whom 1,801 use a mobile phone to send/receive text messages) via its QuickQuery product. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated. This data was weighted to reflect the composition of the general adult population.

For complete survey methodology, including weighting variables, please contact Dave Bowker or Anne Lundregan of Schwartz MSL at [email protected] or 781-684-0770.

About Cloudmark

Cloudmark protects more than 2 billion global subscribers daily from an explosion in messaging abuses across more operator networks than anyone else. Only Cloudmark defends the world’s largest Mobile, Fixed and Social Networks, including AT&T, Comcast, MySpace, NTT, Swisscom and Time Warner Cable, with scalable and accurate protection against the widest range of existing and emerging messaging threats.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
"This is specifically designed to accommodate some of the needs for high availability and failover in a network managed system for the major Korean corporations," stated Thomas Masters, Managing Director at InfranicsUSA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.