You searched for Huawei | SC Media

Your search for Huawei returned 11 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Bradley Barth remove

Your search for Huawei returned 11 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Government, Government/Defense, Podcasts, Security News

Former federal CIO: Efforts to ban Huawei ‘don’t make any sense to me’

Recent U.S. efforts to ban the federal use of telecommunications equipment from Huawei Technologies and other Chinese companies are “malaligned” and “don’t make any sense to me,” said former Federal CIO Tony Scott in a podcast interview with SC Media. Scott, who served under former President Barack Obama and now operates as chairman of his own…
Senate building
Government, Government/Defense, Network Security, Security News, Telecom/VOIP security

Telecom firms urge FCC flexibility as carriers replace Chinese equipment

The U.S. Senate Committee on Commerce, Science and Transportation on Wednesday held a hearing where officials from leading tech and telecom firms posed key recommendations to lawmakers who seek to replace and further prohibit telecommunications equipment that may pose a security risk, including products from China-based Huawei and ZTE. Among the key suggestions was that…
IoT, Malware, Security News

Unlucky 13: Mirai variant uses baker’s dozen of exploits to compromise IoT devices

Researchers at Trend Micro have discovered another new variant of Mirai botnet malware that uses a unique combination of 13 exploits designed to hijack IoT devices. With these 13 exploits, this “Backdoor.Linux.MIRAI.VWIPT” variant is capable of targeting Vacron network video recorders, Dasan GPON routers, D-Link devices, various CCTV-DVR vendors, devices using Realtek SDK with the…
mobile security
Mobile Security, Network Security, Security News, Vulnerabilities

Kernel privilege escalation bug actively exploited in Android devices

Researchers have discovered a zero-day kernel privilege escalation bug that can result in the full compromise of certain Android devices and is apparently being exploited in the wild. Devices known to be affected by the high-level, use-after-free vulnerability include the Pixel 1, 1X:, 2 and 2 XL; the Huawei P20; the Xiaomi Redmi 5A; the…
Security in 2015: Biometrics
Mobile Security, Research, Security News

Researchers fool devices’ biometric scanners with replicated fingerprints

Researchers at Cisco Talos said they were able to fool biometrics-based user authentication technology on eight mobile devices by using 3D-printed molds to create replicates of users’ fingerprints. The process Talos researchers developed to fabricate a user’s biometric signature required a painstaking effort, and in real life would require either direct or indirect access to…
Cybercrime, Malware, Security News

Apache Struts exploit found in Mirai variant may signify shift in attack strategy

Researchers for the first time have discovered a variant of the Mirai Internet of Things botnet that targets an vulnerability found in unpatched versions of the open-source Apache Struts web app development platform. That bug is none other than the infamous CVE-2017-5638, a remote code execution flaw that was exploited in the Equifax data breach, according to…
Director's Cut Videos, Security News

CrowdStrike report: In a first, majority of attacks in 2019 were malware-free (video)

CrowdStrike on Tuesday released its annual Global Threat Report, and for the first time ever, the number of malware-free attacks that the company observed over the previous year exceeded actual malware-based attacks. The cybersecurity firm, which won Best Security Company at the 2020 SC Awards last week during the RSA Conference, reports that 51 percent…
Senate building
Government, Government/Defense, Security News

Proposed MICROCHIPS Act would require protections for technology supply chain

U.S. Senators Mike Crapo, R-Idaho, and Mark Warner, D-Va., have introduced federal legislation designed to protect critical technologies from supply chain attacks by China and other foreign threat actors. The bill, known as S. 2316 or the The Manufacturing, Investment, and Controls Review for Computer Hardware, Intellectual Property and Supply (MICROCHIPS) Act, would require U.S.…
Cybercrime, IoT, Malware, Security News

Gafgyt variant exploits 3 devices to target game servers with DDoS attacks

Researchers have uncovered a new variant of Gafgyt malware (aka BASHLITE) that infects home and small-office routers and networking equipment in order to recruit them into a botnet that bombards gaming servers with distributed denial of service attacks. One of its attacks involves a payload is specifically designed to attack servers running Valve Corporation’s Source…
Government, Government/Defense, Mobile Security, Privacy & Compliance News and Analysis, Security News

Is TikTok out of time? Experts mull implications of ban

Edicts by Wells Fargo, India and the U.S. military forbidding use of popular Chinese video-sharing app TikTok, may portend a national ban and raise questions if such a prohibition would be practical and enforceable, and what the greater implications would be. Owned by Beijing-based internet technology company ByteDance, TikTok has been downloaded more than 2…
Next post in Security News