Huawei oversight board warns of ‘new risks’ to UK infrastructure

An oversight board set up in the UK to monitor the use of Huawei’s equipment in critical telecoms infrastructure has identified ‘new risks’ to security.

While countries like the US and Australia have taken hardline stances against the use of Chinese telecoms equipment from the likes of Huawei in critical infrastructure, the UK has been more accommodating.

Chinese telecoms equipment...

Why we all need to be ready to fight new 5G vulnerabilities

In the evolving landscape of mobile networks, we are beginning to see new vulnerabilities open up through 3G and 4G networks, and it is more than likely that 5G will follow this same fate. Protecting only this Gi Interface is no longer enough for service provider security.

Until recently, the Gi-LAN connecting the EPC (Evolved Packet Core) to the internet was considered to be the most vulnerable part of the service provider network and was protected via Gi-Firewal and anti DDoS systems. The rest of the EPC...

By Ronald Sens, 18 July 2018, 0 comments. Categories: 5G, Security.

Sprint’s ties with Huawei may complicate T-Mobile merger

Congressional lawmakers want the pending Sprint–T-Mobile merger examined over the former's possible Chinese government links.

According to a report from Bloomberg, the lawmakers are concerned that Sprint is majority-owned by Japan’s SoftBank… and SoftBank has worked with Huawei, which the US government has deemed a national security threat.

It’s a rather tenuous link, but it seems the...

Trump’s administration calls on the FCC to block China Mobile

Trump’s administration continues to be wary of Chinese telecoms firms as it asks the FCC not to grant a license to China Mobile.

Citing national security concerns, the U.S. National Telecommunications and Information Administration (NTIA) recommended the FCC deny China Mobile Ltd’s application to offer telecommunications services from within the United States.

State-owned China Mobile is the world’s largest phone carrier by subscribers, with over 902 million users as of June 2018. The...

By Ryan Daws, 03 July 2018, 0 comments. Categories: China, Government, Industry, Mobile, N America, Operators, Regulation, Security, Surveillance.

WiFi receives a security boost as WPA3 certification begins

WiFi devices have used the WPA2 protocol for over a decade, but that will start to change as the WiFi Alliance begins WPA3 certification.

WPA2 was launched in 2004 so, 14 years later, it’s ripe for replacement.

The latest protocol adds several new protections. One of the major improvements aims to prevent hackers cracking the password by repetitively making guesses.

So-called ‘dictionary attacks’ using infamous cracking apps such as Cain and Abel,

By Ryan Daws, 26 June 2018, 0 comments. Categories: Connectivity, IoT, Security, Standards, WiFi, Wireless.

Huawei appears to cut research funding in Australia

Huawei appears to be cutting research funding in Australia as it continues to face problems in the country over national security fears.

The company’s Australian financial reports show a drop in research spending from $81,000 in 2016 to zero last year. For comparison, back in 2015, the company spent $8.3 million – and $10.1 million the year before that.

The company denies any reduction in research spending.

A spokesman for Huawei said it’s provided more than $1 million of IoT equipment...

By Ryan Daws, 25 June 2018, 0 comments. Categories: 5G, Connectivity, Government, Industry, Infrastructure, Mobile, Networks, Regulation, Research, Security.

Symantec has discovered Chinese hacking of telecoms and satellites

Cybersecurity firm Symantec has exposed Chinese hacking of satellite communications and telecoms in the United States and Southeast Asia.

The company’s AI-based Targeted Attack Analytics (TAA) system helped researchers expose a hacking campaign from a group called Thrip.

On the surface, Symantec said the activity looked innocuous. TAA alerted Symantec’s investigation team and set them on the path to discovering the attack from a group the company has been...

By Ryan Daws, 20 June 2018, 0 comments. Categories: Government, Industry, Infrastructure, Networks, Satellite, Security, Surveillance.

Australian MP is next to call for a ban on Chinese 5G equipment

Australian Labor MP Michael Danby has become the latest politician to call for a ban on buying 5G network equipment from Chinese firms claiming they are ‘controlled’ by the government.

Speaking to parliament last night, Danby requested Prime Minister Malcolm Turnbull take a similar stance as in his tenure as communications minister when he barred Huawei from bidding for the National Broadband Network (NBN).

Mr Danby said:

“Now he [Malcolm Turnbull] and his government must...

By Ryan Daws, 30 May 2018, 0 comments. Categories: 5G, China, Government, Industry, Infrastructure, Mobile, Networks, Regulation, Security, Surveillance.

Why cybersecurity solution spending will reach $134 billion

The online security market is expanding globally, and for good reason. The dramatic increase in connected devices has created a huge attack surface for cyber criminals. Whether their motive is mischief, or theft, the impacts can be far-reaching and very costly.

As an example, the downtime cost on Amazon’s North American sales operations as a result of the 2016 'Dyn' cyberattack - ~211 minutes of service disruption - resulted in a loss of $32 million.

Most companies don't have the...

By David H. Deans, 17 April 2018, 0 comments. Categories: Infrastructure, Research, Security.

UK’s GCHQ carried out a major cyber offensive against ISIS

GCHQ’s Jeremy Fleming has used his first public speech as director to reveal the intelligence agency carried out a major cyber offensive against ISIS.

"The outcomes of these operations are wide-ranging," he told the Cyber UK conference in Manchester. "In 2017 there were times when Daesh found it almost impossible to spread their hate online, to use their normal channels to spread their rhetoric, or trust their publications."

Beyond causing disruption to the group’s spread of...

By Ryan Daws, 12 April 2018, 0 comments. Categories: Government, Security.

How demand for IoT data security solutions is gaining momentum

Internet of Things (IoT) technology deployments have increased across the globe, as more CIOs and CTOs explore new commercial applications. However, many organizations continue to seek IoT solutions that include comprehensive data protection capabilities.

Security continues to be a major concern for IT professionals when deploying IoT projects within their organizations, according to the latest worldwide market study by 451 Research.

When asked to rank which technologies or processes their organizations...

By David H. Deans, 22 March 2018, 0 comments. Categories: IoT, Networks, Security.

Armed Forces Chief: UK must boost its navy to defend underwater cables from Russia

Air Chief Marshal Sir Stuart Peach has warned the UK must boost its naval forces to counter the Russian threat to underwater cables.

Russia’s modernised navy has often been spotted near to underwater communications cables in the Atlantic. The economic reliance on these cables makes them a prime target.

Britain’s economy is around 80 percent service-based and relies on underwater cables to...

By Ryan Daws, 15 December 2017, 0 comments. Categories: Connectivity, Europe, Infrastructure, Security.

Spy Chief: Russian hackers targeted UK infrastructure

The chief of the UK’s National Cyber Security Centre (NCSC) has confirmed attacks on infrastructure from Russian hackers.

Ciaran Martin, the founding chief executive of the NCSC, claims the Russians have been attempting ‘to undermine the international system’ and sow discord.

Speaking at the Times Tech Summit in London, Martin said: "I can't get into precise details of intelligence matter, but I can confirm that...

By Ryan Daws, 15 November 2017, 0 comments. Categories: Government, Infrastructure, Security.

Mobile networks are too vulnerable for smart cities – users at risk of surveillance

An analytical report has revealed serious vulnerabilities in current and future mobile networks which makes them unsuitable for smart cities and puts users at risk of surveillance.

The cybersecurity experts at Positive Technologies discovered security flaws in the 4G network core known as the EPC (Evolved Packet Core) which can be exploited through vulnerabilities in the GTP protocol.

GTP (GPRS Tunneling Protocol) is a group of...

By Ryan Daws, 10 October 2017, 0 comments. Categories: 5G, Industry, IoT, LTE, Mobile, Networks, Security, Smart Cities, Surveillance.

Group with Russian government links breached the US power grid

A leading cybersecurity firm has claimed a hacking group with alleged links to the Russian government breached the US power grid.

Symantec says the hacking group is nicknamed Dragonfly 2.0 and compromised more than a dozen American companies in recent months. The companies supply power to the US power grid and the hackers acquired high-level access.

The group, which has also gone by the nicknames of Crouching...

By Ryan Daws, 07 September 2017, 0 comments. Categories: Government, Security.

The technology, media and telecom 2017 M&A deal update

U.S. West Coast technology companies are expected to remain the driving targets for M&A transactions in the TMT sector. Bidders are likely to come from American firms across the country, plus from Europe, Asia, and Canada.

Though a return to huge mega-mergers are not anticipated this year, given the continued uncertainty in the political environment, software companies are still heavily sought-after assets, with deal volume expected to gain new momentum.

Moreover, growing concern about cyberattacks led to...

By David H. Deans, 28 July 2017, 0 comments. Categories: Content, Entertainment, Security.

Spiderman pleads guilty to hacking 900,000 broadband routers last year

Spiderman has pleaded guilty to a hack which took 900,000 broadband routers offline last year.

Just to clarify, we’re not talking about Marvel’s iconic web-slinging hero, but rather a hacker authorities referred to as ‘Spiderman’ when he was picked up back in February.

The 29-year old man was arrested by British police at Luton airport on behalf of Germany’s Federal Criminal Police Office who alleged he was responsible for hacking the broadband...

By Ryan Daws, 25 July 2017, 0 comments. Categories: Broadband, Industry, Security.

NATO: Cyber attacks like WannaCry, Petya could invoke Article 5 and trigger a military response

NATO has warned cyber attacks like WannaCry and Petya could trigger Article 5 of the treaty and be met with a military response from members after the organisation said there are signs the aforementioned incidents were state-sponsored.

Article 5 is the basic principle of collective defense. An attack on a NATO member is deemed an attack on all members and, if invoked, ties others to a collective response. It has only been triggered once in NATO’s history by the United States...

By Ryan Daws, 04 July 2017, 0 comments. Categories: Government, Security, Surveillance.

Exploring the online payment fraud prevention market

The convenience and global reach made possible by online channels has led to the development of a broad set of digital eCommerce services. However, the accessibility of the Internet and the ability to commit fraud remotely creates an environment for cyber criminals to prosper.

Meanwhile, the potential attack surface for miscreants is enormous -- about 94 billion transactions were made for remote goods purchases in 2016, which is only a fraction of the total eCommerce landscape.

That said, advanced security...

By David H. Deans, 27 June 2017, 0 comments. Categories: Customer Service, Mobile, Security.