The BlackBerry can no longer do phone things

After a decadelong battle with irrelevance, the BlackBerry is no more. The company ended access to basic smartphone functionality for its classic devices today.

What that means: If you still have a working BlackBerry running on BlackBerry 10 software or 7.1 OS and earlier, it’s time to hang up the phone belt holster for good: As of today, you’ll no longer be able to reliably use that device for SMS, phone calls, data usage, or even calling 911. It’s decor now.

  • In most cases, newer Android-based BlackBerry phones will continue to function normally. Or, whatever normal means for them.

End of an era: Once the crème de la crème of smartphone tech, the BlackBerry had 80 million active users in 2012—with power button-smashers like President Obama, Kim Kardashian, and your uncle who drove an Audi A4.

Still, the company soldiers on. BlackBerry’s pivoted to focus on cybersecurity and provide operating systems for cars, as the auto industry moves toward autonomy. Heck, it even moonlit as a meme stock last year.

Hot this week

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.

The Overlooked Vulnerability in Modern Cybersecurity

Security breaches often stem from communication failures rather than technical flaws. Building shared understanding between teams creates stronger protection than any firewall alone.

Why Passwords Alone Fail Us

Passwords alone cannot protect our digital lives anymore. Discover why password managers and two-factor authentication are non-negotiable tools for true security.

The Quiet Strength of Cyber Resilience

Building cyber resilience involves layered strategies like multi factor authentication, reliable backups, and incident planning - practical steps any organization can implement immediately.

Topics

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.

The Overlooked Vulnerability in Modern Cybersecurity

Security breaches often stem from communication failures rather than technical flaws. Building shared understanding between teams creates stronger protection than any firewall alone.

Why Passwords Alone Fail Us

Passwords alone cannot protect our digital lives anymore. Discover why password managers and two-factor authentication are non-negotiable tools for true security.

The Quiet Strength of Cyber Resilience

Building cyber resilience involves layered strategies like multi factor authentication, reliable backups, and incident planning - practical steps any organization can implement immediately.

Practical Cybersecurity Habits for Everyday Protection

Essential cybersecurity habits everyone can implement today including password managers multi-factor authentication and phishing awareness with global resource examples.

Mental Wellness in Cybersecurity A Necessary Focus

Cybersecurity professionals face unique mental health challenges requiring organizational support and personal resilience strategies for sustainable career longevity.

Building Stronger Defenses Through People

Human behavior remains cybersecurity's greatest vulnerability and strongest asset, with practical steps to foster collective vigilance.
spot_img
Exit mobile version