Australian MP is next to call for a ban on Chinese 5G equipment

Australian Labor MP Michael Danby has become the latest politician to call for a ban on buying 5G network equipment from Chinese firms claiming they are ‘controlled’ by the government.

Speaking to parliament last night, Danby requested Prime Minister Malcolm Turnbull take a similar stance as in his tenure as communications minister when he barred Huawei from bidding for the National Broadband Network (NBN).

Mr Danby said:

“Now he [Malcolm Turnbull] and his government must...

By Ryan Daws, 30 May 2018, 0 comments. Categories: 5G, China, Government, Industry, Infrastructure, Mobile, Networks, Regulation, Security, Surveillance.

Why cybersecurity solution spending will reach $134 billion

The online security market is expanding globally, and for good reason. The dramatic increase in connected devices has created a huge attack surface for cyber criminals. Whether their motive is mischief, or theft, the impacts can be far-reaching and very costly.

As an example, the downtime cost on Amazon’s North American sales operations as a result of the 2016 'Dyn' cyberattack - ~211 minutes of service disruption - resulted in a loss of $32 million.

Most companies don't have the...

By David H. Deans, 17 April 2018, 0 comments. Categories: Infrastructure, Research, Security.

UK’s GCHQ carried out a major cyber offensive against ISIS

GCHQ’s Jeremy Fleming has used his first public speech as director to reveal the intelligence agency carried out a major cyber offensive against ISIS.

"The outcomes of these operations are wide-ranging," he told the Cyber UK conference in Manchester. "In 2017 there were times when Daesh found it almost impossible to spread their hate online, to use their normal channels to spread their rhetoric, or trust their publications."

Beyond causing disruption to the group’s spread of...

By Ryan Daws, 12 April 2018, 0 comments. Categories: Government, Security.

How demand for IoT data security solutions is gaining momentum

Internet of Things (IoT) technology deployments have increased across the globe, as more CIOs and CTOs explore new commercial applications. However, many organizations continue to seek IoT solutions that include comprehensive data protection capabilities.

Security continues to be a major concern for IT professionals when deploying IoT projects within their organizations, according to the latest worldwide market study by 451 Research.

When asked to rank which technologies or processes their organizations...

By David H. Deans, 22 March 2018, 0 comments. Categories: IoT, Networks, Security.

Armed Forces Chief: UK must boost its navy to defend underwater cables from Russia

Air Chief Marshal Sir Stuart Peach has warned the UK must boost its naval forces to counter the Russian threat to underwater cables.

Russia’s modernised navy has often been spotted near to underwater communications cables in the Atlantic. The economic reliance on these cables makes them a prime target.

Britain’s economy is around 80 percent service-based and relies on underwater cables to...

By Ryan Daws, 15 December 2017, 0 comments. Categories: Connectivity, Europe, Infrastructure, Security.

Spy Chief: Russian hackers targeted UK infrastructure

The chief of the UK’s National Cyber Security Centre (NCSC) has confirmed attacks on infrastructure from Russian hackers.

Ciaran Martin, the founding chief executive of the NCSC, claims the Russians have been attempting ‘to undermine the international system’ and sow discord.

Speaking at the Times Tech Summit in London, Martin said: "I can't get into precise details of intelligence matter, but I can confirm that...

By Ryan Daws, 15 November 2017, 0 comments. Categories: Government, Infrastructure, Security.

Mobile networks are too vulnerable for smart cities – users at risk of surveillance

An analytical report has revealed serious vulnerabilities in current and future mobile networks which makes them unsuitable for smart cities and puts users at risk of surveillance.

The cybersecurity experts at Positive Technologies discovered security flaws in the 4G network core known as the EPC (Evolved Packet Core) which can be exploited through vulnerabilities in the GTP protocol.

GTP (GPRS Tunneling Protocol) is a group of...

By Ryan Daws, 10 October 2017, 0 comments. Categories: 5G, Industry, IoT, LTE, Mobile, Networks, Security, Smart Cities, Surveillance.

Group with Russian government links breached the US power grid

A leading cybersecurity firm has claimed a hacking group with alleged links to the Russian government breached the US power grid.

Symantec says the hacking group is nicknamed Dragonfly 2.0 and compromised more than a dozen American companies in recent months. The companies supply power to the US power grid and the hackers acquired high-level access.

The group, which has also gone by the nicknames of Crouching...

By Ryan Daws, 07 September 2017, 0 comments. Categories: Government, Security.

The technology, media and telecom 2017 M&A deal update

U.S. West Coast technology companies are expected to remain the driving targets for M&A transactions in the TMT sector. Bidders are likely to come from American firms across the country, plus from Europe, Asia, and Canada.

Though a return to huge mega-mergers are not anticipated this year, given the continued uncertainty in the political environment, software companies are still heavily sought-after assets, with deal volume expected to gain new momentum.

Moreover, growing concern about cyberattacks led to...

By David H. Deans, 28 July 2017, 0 comments. Categories: Content, Entertainment, Security.