Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

Nokia Siemens Examining Motorola Acquisition

Buying Motorola's telecom equipment operations may help Nokia crack the U.S. mobile market.

Once synonymous with networking leadership, Motorola today is synonymous with selling itself. The latest to kick Motorola's tires is reported to be Nokia Siemens Networks (NSN), which has been examining Motorola's telecom equipment operations.

NSN has been almost desperate to break into the North American market in a big way, particularly after it failed in its attempt to acquire Nortel Networks' LTE/CDMA operation in bankruptcy proceedings. The Wall Street Journal reported Wednesday that unnamed sources said NSN is in talks with Motorola to acquire its telecom equipment arm in a deal that could reach $1.1 billion to $1.3 billion.

Finland-based Nokia, which is still the world's mobile phone market leader, has lagged far behind in mobile handsets in the United States, and a deal with NSN would help it crack the U.S. market. Nokia is the dominant partner in Nokia Siemens.

Mobile spectrum would likely play an important part in any acquisition. Nokia rose to the top of the mobile phone universe by riding the European GSM standard, which is under growing competitive pressure from Long-Term Evolution (LTE). Motorola is strong in another robust wireless standard, WiMax, but Nokia has sworn off WiMax to focus on LTE and HSPA, yet another wireless infrastructure standard.

Private equity groups have also been circling Motorola and they would likely play an important role in the coming breakup of Motorola. The firm's management has targeted the first quarter of 2011 for splitting up the company.

Meanwhile, Motorola's mobile devices and home businesses have regained traction in recent months, primarily due to new Android-based phones. The unit, which includes television set-top boxes as well as mobile handsets, is operated by co-CEO Sanjay Jha who was hired away from Qualcomm to shape up the mobile unit. Jha has said the unit will be profitable by the end of the year.

Pushing behind the scenes is financier and former corporate raider Carl Icahn, who has taken a major financial position in Motorola and who has argued the company is worth more broken up than as a single company.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.