Security News
Fujitsu is collaborating with the Telecom Infra Project OpenRAN Project Group to accelerate adoption of open radio access network infrastructure, helping service providers speed new 5G services to market at reduced costs. With commercial 5G deployments gaining momentum worldwide, an increasing number of network service providers are embracing Open RAN technologies to take advantage of greater component choice, reduced costs and improved network performance.
Source Photonics announced a range of 800G optical transceivers for datacenter and telecom applications during the OFC 2021 virtual event. As the initial wave of widescale deployment of 400G is taking place in datacenters, hyperscale datacenter customers are already looking into 800G and beyond, together with the release of 25.6T switching ASIC, to further support the increasing demand for bandwidth-intensive applications.
Benu Networks announced that its Secure Access Service Edge solution now supports the Telecom Infra Project's OpenWiFi Controller with the ability to manage OpenWiFi compliant third party Wi-Fi access points. Benu Networks' Remote Workforce and Enterprise SASE solutions make it easier than ever to secure network traffic, dynamically launch services, and manage the TIP OpenWiFi family of Access Points.
China-linked cyber-espionage group Mustang Panda is targeting telecommunications companies in Asia, Europe, and the United States for espionage purposes, according to a warning from security researchers at McAfee. The new malware attacks, McAfee says, employ the same tactics, techniques and procedures previously associated with Mustang Panda.
To help these technologies work better together while maintaining security, the Global System Mobile Association provides global industry specifications-guided by industry leaders-to help the ecosystem navigate these challenges. Last November, the GSMA launched its new process for the governance and approval of Industry Specifications.
A "Persistent attacker group" with alleged ties to Hezbollah has retooled its malware arsenal with a new version of a remote access Trojan to break into companies worldwide and extract valuable information. In a new report published by the ClearSky research team on Thursday, the Israeli cybersecurity firm said it identified at least 250 public-facing web servers since early 2020 that have been hacked by the threat actor to gather intelligence and steal the company's databases.
Aradatum introduced the world's first truly self-powered macro cell tower that can be placed literally anywhere. Taking a unique approach to modernizing telecom infrastructure, the start-up's self-powered towers give wireless pioneers and mobile and virtual network operators access to previously unreached and strategic locations needed to optimize their advanced applications of 5G, fixed wireless access, Citizens Broadband Radio Service, neutral host, private networks, and edge computing.
Telecom companies in Britain face hefty fines if they don't comply with strict new security rules under a new law proposed in Parliament on Tuesday that is aimed at blocking high-risk equipment suppliers like China's Huawei. The Telecommunications Bill tightens security requirements for new high speed 5G wireless and fiber optic networks, with the threat of fines of up to either 10% of sales or 100,000 pounds a day for companies that don't follow the rules.
Belgium's dominant telecom operator Proximus said Friday that it will gradually replace its equipment from the Chinese manufacturer Huawei with products from Finnish supplier Nokia and Sweden's Ericsson. The sensitive decision comes at a time when the United States is heaping pressure on its European allies to shun equipment from Chinese firms in developing their 5G networks.
Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev and National University of Singapore researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices. The researchers developed a method to detect connected, vulnerable IoT models before they are compromised by monitoring the data traffic from each smart home device.