Security News
Multiple high-severity security vulnerabilities have been disclosed in ConnectedIO's ER2000 edge routers and the cloud-based management platform that could be exploited by malicious actors to...
A vulnerability in Thales' Cinterion EHS8 M2M module, a Java-powered embedded 3G system used in millions of Internet-of-Things devices for connectivity, was revealed yesterday by IBM's X-Force Red. The bug, disclosed to Thales and addressed in a patch made available to IoT vendors in February, makes it possible for an attacker to extract the code and other resources from a vulnerable device.
Some have claimed the Trump administration's concerns have more to do with losing the 5G arms race than anything else, but ostensibly its chief worries have been chalked up to security, with the US government claiming Huawei's 5G kit could be backdoored by Beijing. For its part, earlier this year, the UK's Department for Digital, Culture, Media & Sport labelled Huawei as a "High-risk" vendor over its perceived ties to the Chinese government, and issued strong new rules prohibiting carriers from using the firm's equipment within the core 5G network.
Despite the growth of 5G and 4G, older network technologies beset with certain security flaws will be around for many more years, says enterprise security provider Positive Technologies. For its "SS7 network security analysis" report, Positive Technologies analyzed the networks of 28 telecom providers across Europe, Asia, Africa, and South America, between 2018 and 2019.
Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a user's location.
5G cellular mobile communications, when implemented, are expected to provide high bandwidth, low latency, energy savings, better connectivity, but security and privacy must also be assured. The...
Crypto-boffins' paper shows AKA protocol still broken A protocol meant to protect smartphone users' privacy is vulnerable to fake base station attacks all the way from 3G to 5G, according to a...
An analysis of popular 3G and 4G cellural USB modems and routers used around the world revealed a myriad of serious vulnerabilities in each of them. The SCADA Strange Love team - a group of securit...