A New Consensus Is Emerging On How to Handle The Risk from China’s 5G | #TpromoCom #China #Spy #5G | Chinese telecom tech is invading the physical world, but Europeans and industry have strategies to contain the threat.
“No one calls it an intelligence risk, but national security agencies across the world are concerned about China’s 5G modems and other devices,” says Al Colombo, Senior Design Specialist with TpromoCom of Canton, Ohio.
Much of the Western intelligence debate around Chinese high-speed 5G technology has focused on hardware and software. Once the hardware is already out in the wild — which most think is inevitable — the future of the fight is in managing risk. It’s doable, if not yet widely advertised, according to several experts speaking at a U.S. intelligence conference this week, by quarantining Chinese equipment and deploying smarter electromagnetic spectrum management tools to better handle threats.
Bottom line: Huawei leads the world in the ability to rapidly produce cheap telecom hardware (as well as the underlying software.) Recent reports, including one from NATO, state it plainly. It’s one reason why European countries, including U.S. allies like Germany and the U.K., have been reluctant to ban tech from Huawei outright, even in the face of heavy U.S. pressure.
To read the remainder of this extremely interesting and timely news article, click here.
Iranians targeted by smartphone surveillance operation: report | #TpromoCom #Smartphone #Spy #Iran | Israeli cybersecurity firm Check Point on Friday said a surveillance operation had targeted the smartphones of several hundred Iranian citizens via malware implanted in their handsets, indicating Tehran was responsible.
“This is the first time to our knowledge that a technical analysistechnique has highlighted the fact a government has led a cyberespionage campaign on smartphones,” the firm’s vice-president for Europe, Thierry Karsenti, told AFP.
To read the remainder of this informative news article, click here.
How antivirus software can be turned into a tool for spying | #TpromoCom #antivirus #spy #hacker #hackers | Security software runs closest to the bare metal of a computer, with privileged access to nearly every program, application, Web browser, e-mail and file. There is good reason for this: Security products are intended to evaluate everything that touches your machine in search of anything malicious, or even vaguely suspicious.
By downloading security software, consumers also run the risk that an untrustworthy antivirus maker — or hacker or spy with a foothold in its systems — could abuse that deep access to track customers’ every digital movement. To read the remainder of this news story, click here.