(Source: Telecom Asia) “In mobile security, we do not only look at the hardware,” said Chau. “When you log on a WiFi network, you do not know whether there is a man in the middle, …