Risk
9/2/2010
05:59 PM
50%
50%

Verizon Announces Prepaid Data Plans For Smartphones

No contract, $30 a month unlimited data plans are planned for some smartphones including select Motorola and HTC Droid handsets and some RIM BlackBerry models.

Verizon Wireless is offering customers of some of its smartphones and multimedia phones the option of prepaid data plans starting at the end of the month. For eligible smartphones, Verizon is offering a pay-as-you-go plan of $30 a month for unlimited data. For multimedia phones, the prepaid plans are $10 a month for 25 MB, plus 20 cents for each megabyte over the limit. The plans will be available beginning Sept. 28.

Prepaid plans do not require a long-term contract and customers can cancel anytime without a penalty. Depending on the phone, and how much its purchase price is subsidized by the carrier, customers often have to sign two-year service plans in order to get the discounted price for a phone. The smartphones covered under the Verizon plan announced Thursday include models of Research In Motion's BlackBerry and Motorola and HTC Droids. Among the multimedia phones are the LG Chocolate and Samsung Alias.

"Our prepaid customers will now have the freedom to enjoy all of the capabilities that these phones have to offer, while controlling costs and without being tied to a contract," Jim Sullivan, director of marketing for Verizon, said in a statement.

The full list of Eligible smartphones includes select models of the BlackBerry Curve, Storm, Storm2, Tour and Bold; the Palm Pre Plus and Pixi Plus; the Motorola Droid, Droid X, Droid 2 and Devour; the HTC Droid Eris and Incredible; and the LG Ally. Qualifying multimedia phones include the LG enV Touch, enV3, Chocolate Touch and VX8360; the Samsung Alias 2 and Renown; the Nokia Twist and the Casio Exilim.

Verizon Wireless' largest competitor in the U.S. mobile phone market is AT&T, which offers prepaid plans for unlimted talk and text on some phones.

FURTHER READING:

Verizon Wireless Scores Bing Android App First

Verizon Wireless Offers Budget Phone From ZTE

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.