Huawei Inks 40 Contracts to Build and Operate 5G Networks

Huawei Technologies has inked 40 commercial contracts for 5G technology, leading its Q1 revenue to leap 39 percent to 179.7 billion yuan ($26.8 billion). The Chinese company also stated that it has shipped about 70,000 5G base stations, making it a leading supplier of 5G gear. Huawei’s net-profit margin rose a bit to 8 percent. The company also introduced what it calls the world’s first 5G-communication hardware for the auto industry. Its MH5000 module is built on its newly launched Balong 5000 5G chip. Continue reading Huawei Inks 40 Contracts to Build and Operate 5G Networks

U.S. Tries Softer Tack to Limit Huawei at Prague 5G Confab

According to sources, on May 2-3 when officials from 30+ countries meet in Prague to discuss security principles for 5G networks, the U.S. will propose measures to prevent China’s Huawei from gaining dominance. The U.S. has long believed that the Chinese government can use Huawei’s gear to spy via Internet-connected products from AR to self-driving cars. Huawei has denied the accusations. The U.S. strategy at the upcoming meeting, said a U.S. official, is “softer” than its previous efforts to limit Huawei’s influence. Continue reading U.S. Tries Softer Tack to Limit Huawei at Prague 5G Confab

China’s Internet Model Gains Popularity Among Autocracies

Autocratic countries are moving towards China’s version of the Internet — limited content and controlled data — as a way of ensuring their own continued power and mimicking the success of Chinese corporations such as Alibaba Group and Tencent Holdings. Vietnam, Thailand, India and Russia are among those embracing a government-controlled model. China has also become the first government to intentionally use artificial intelligence for racial profiling, in this case its 11 million Uighurs, a Muslim minority group. Continue reading China’s Internet Model Gains Popularity Among Autocracies

Another Perspective on Deep Fakes: Threat and Opportunity

At the NAB 2019’s Broadcast Cybersecurity course, Emblematic Group founder/chief executive Nonny de la Peña introduced deep fakes by showing pairs of images and asking the audience to call out which was fake and which was real. From paired images of Presidents Obama and Trump, among others, audience members were consistently unable to pick the correct “fake” image. University of Washington researchers created a very convincing — but fake — video of Barack Obama, she revealed, by using neural network AI and 14 hours of Obama footage. Continue reading Another Perspective on Deep Fakes: Threat and Opportunity

Private Facebook User Data Made Public on Amazon Cloud

Cybersecurity firm UpGuard has discovered that Facebook user data has been publicly available on Amazon cloud services. UpGuard was unable to determine how long the personal data was vulnerable, but Mexico-based Cultura Colectiva, for example, stored account names, identification numbers, comments and reactions in 540 million records of Facebook users, which anyone could access and download. The discovery makes it clear that Facebook user data is still insecure, even after the Cambridge Analytica scandal. Continue reading Private Facebook User Data Made Public on Amazon Cloud

U.S., China Advance Negotiations on Trade, Cybersecurity

U.S. and China just held a meeting to resolve several issues that have risen to the forefront in their yearlong trade dispute. The Trump administration is pushing China to lift restrictions that make it difficult for U.S. companies to operate there. U.S. businesses also chafe against China’s cybersecurity laws that require them to store data in China and rely on Chinese network equipment. Although these topics have not been on the negotiating table, China has recently made it clear it is willing to discuss them. Continue reading U.S., China Advance Negotiations on Trade, Cybersecurity

Congress Introduces IoT Bill to Protect Connected Devices

Congress introduced the Internet of Things Cybersecurity Improvement Act yesterday, in an effort to position legislative power behind securing connected devices. Defense Intelligence Agency director Lieutenant General Robert Ashley told lawmakers last year that IoT devices are considered one of the “most important emerging cyberthreats” to national security. Without a national standard for IoT security, we need to rely on steps taken by individual companies. The legislation, which was first introduced in 2017, would require security standards for IoT devices used by the federal government. Continue reading Congress Introduces IoT Bill to Protect Connected Devices

Huawei Sues U.S. Over Law Banning Sale of Its 5G Products

Huawei Technologies challenged the constitutionality of the National Defense Authorization Act’s provision that restricts federal agencies from buying any product from the Chinese telecom, its rival ZTE or third parties, such as contractors. One of Huawei’s chairmen, Guo Ping, stated that, in passing this law, “Congress acted unconstitutionally as judge, jury and executioner.” Huawei also opened a Cyber Security Transparency center in Brussels to allay suspicions that it is involved in espionage for China. Continue reading Huawei Sues U.S. Over Law Banning Sale of Its 5G Products

Google Chrome Extension Alerts Users to Password Issues

To combat data breaches, Google has created a Chrome extension to provide a “password checkup” that compares users’ passwords with a database of four billion unique usernames and passwords that have been compromised. The extension works in the background, only showing a warning if it finds a match. That’s all it does: it is not a password manager that determines how weak or strong passwords are. Google accounts, often the key to a user’s email address, are breached mainly because people reuse passwords on multiple sites. Continue reading Google Chrome Extension Alerts Users to Password Issues

Experts Question Apple’s Security in Light of FaceTime Bug

News site 9to5Mac reported that Apple’s FaceTime app, which places audio/video calls over the Internet, had a significant bug: an iPhone user could call another iPhone user and eavesdrop on that person’s conversation through the phone’s microphone — even if the call recipient doesn’t answer the call. The bug was actually discovered a full week before Apple disabled Group FaceTime and stated that it was working to fix it. In that gap, a developer discovered the bug, which was reported in 9to5Mac. Security researchers have dubbed the glitch FacePalm. Continue reading Experts Question Apple’s Security in Light of FaceTime Bug

Have You Been Hacked? Very Likely In Light of Mega-Breach

Security researcher Troy Hunt, who offers a way to search if your email addresses or passwords have been breached, maintains Collection #1, the largest breach ever, which holds 772,904,991 unique emails and 21 million unique passwords, all of which have been recently posted to a hacking forum. Those numbers represent a “cleaned-up” version of the raw data, which comprise 2.7 billion rows of email addresses and passwords, including over one billion unique combinations of hacked emails and passwords. Continue reading Have You Been Hacked? Very Likely In Light of Mega-Breach

Facebook Seeks to Stop Russian Disinformation Campaigns

Facebook deleted nearly 500 pages and accounts after discovering two disinformation campaigns linked to Russia. Employees of Sputnik, a Russian government-controlled agency, were linked to many of the pages that use innocuous independent news pages on sports, travel and weather to mask their disinformation. The pages, which were targeted largely at users in Europe and Central Asia, make clear that Russian-government linked groups continue their efforts to use Facebook as a means of spreading misinformation. Continue reading Facebook Seeks to Stop Russian Disinformation Campaigns

CES Panel: Building the Quantum Internet With 6G, Intention

Axios chief technology correspondent Ina Fried asked why we’re talking about 6G when 5G is just beginning to make an appearance. “Before we get into what comes after 5G, how ready are we to connect billions of devices?” she asked. She got a quick answer from Public Knowledge cybersecurity policy director Megan Stifel. “We’re getting there, but we’re not there yet,” she said. “At least we’re beginning to see companies think about ‘secure to market,’ but there is no core baseline required. This keeps me up at night.” Continue reading CES Panel: Building the Quantum Internet With 6G, Intention

CES Panel: Impact of Evolving Tech on Autonomous Vehicles

Faye Francy, executive director of the Automotive Information Sharing and Analysis Center (Auto-ISAC), led a conversation about the impact of machine learning, deep learning and AI on the autonomous vehicle (AV) ecosystem. “They work together to bring great things — and possibly nefarious things — to the auto industry,” she said. Inivision AI chairman Seamus Hatch noted that the three terms aren’t interchangeable. “We’re many years behind the singularity,” he said. “It’s a machine trained to solve a specific problem faster and more accurately than a human.” Continue reading CES Panel: Impact of Evolving Tech on Autonomous Vehicles

Congress Passes Bill Intended to Boost Quantum Computing

Congress passed a bill that aims to speed up the development of quantum computing in the United States. The technology is anticipated to revolutionize cybersecurity among other areas. The House approved the bill in a 348-11 vote. President Trump is expected to sign it into law, since quantum computing has been a priority of his administration. China has been focused on the technology and plans to open a laboratory in 2020. With the new bill, U.S. legislators hope to push efforts to keep up with or surpass rivals. Continue reading Congress Passes Bill Intended to Boost Quantum Computing

Page 1 of 9123456789