You searched for Huawei | SC Media

Your search for Huawei returned 10 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Bradley Barth remove

Your search for Huawei returned 10 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Government, Government/Defense, Podcasts, Security News

Former federal CIO: Efforts to ban Huawei ‘don’t make any sense to me’

Recent U.S. efforts to ban the federal use of telecommunications equipment from Huawei Technologies and other Chinese companies are “malaligned” and “don’t make any sense to me,” said former Federal CIO Tony Scott in a podcast interview with SC Media. Scott, who served under former President Barack Obama and now operates as chairman of his own…
Government, Government/Defense, Mobile Security, Privacy & Compliance, Security News

Is TikTok out of time? Experts mull implications of ban

Edicts by Wells Fargo, India and the U.S. military forbidding use of popular Chinese video-sharing app TikTok, may portend a national ban and raise questions if such a prohibition would be practical and enforceable, and what the greater implications would be. Owned by Beijing-based internet technology company ByteDance, TikTok has been downloaded more than 2…
IoT, Network Security, Security News, Vulnerabilities

CallStranger bug in billions of devices can enable data exfiltration, DoS attacks

Billions of Internet of Things and Local Area Network devices that rely on the Universal Plug and Play (UPnP) protocol for discovery of and interaction with other devices are vulnerable to “CallStranger,” a bug that can be exploited to exfiltrate data, launch a denial of service attack or scan ports. The Windows 10 operating system,…
Security in 2015: Biometrics
Mobile Security, Research, Security News

Researchers fool devices’ biometric scanners with replicated fingerprints

Researchers at Cisco Talos said they were able to fool biometrics-based user authentication technology on eight mobile devices by using 3D-printed molds to create replicates of users’ fingerprints. The process Talos researchers developed to fabricate a user’s biometric signature required a painstaking effort, and in real life would require either direct or indirect access to…
Senate building
Government, Government/Defense, Network Security, Security News, Telecom/VOIP security

Telecom firms urge FCC flexibility as carriers replace Chinese equipment

The U.S. Senate Committee on Commerce, Science and Transportation on Wednesday held a hearing where officials from leading tech and telecom firms posed key recommendations to lawmakers who seek to replace and further prohibit telecommunications equipment that may pose a security risk, including products from China-based Huawei and ZTE. Among the key suggestions was that…
Director's Cut Videos, Security News

CrowdStrike report: In a first, majority of attacks in 2019 were malware-free (video)

CrowdStrike on Tuesday released its annual Global Threat Report, and for the first time ever, the number of malware-free attacks that the company observed over the previous year exceeded actual malware-based attacks. The cybersecurity firm, which won Best Security Company at the 2020 SC Awards last week during the RSA Conference, reports that 51 percent…
Cybercrime, IoT, Malware, Security News

Gafgyt variant exploits 3 devices to target game servers with DDoS attacks

Researchers have uncovered a new variant of Gafgyt malware (aka BASHLITE) that infects home and small-office routers and networking equipment in order to recruit them into a botnet that bombards gaming servers with distributed denial of service attacks. One of its attacks involves a payload is specifically designed to attack servers running Valve Corporation’s Source…
mobile security
Mobile Security, Network Security, Security News, Vulnerabilities

Kernel privilege escalation bug actively exploited in Android devices

Researchers have discovered a zero-day kernel privilege escalation bug that can result in the full compromise of certain Android devices and is apparently being exploited in the wild. Devices known to be affected by the high-level, use-after-free vulnerability include the Pixel 1, 1X:, 2 and 2 XL; the Huawei P20; the Xiaomi Redmi 5A; the…
Senate building
Government, Government/Defense, Security News

Proposed MICROCHIPS Act would require protections for technology supply chain

U.S. Senators Mike Crapo, R-Idaho, and Mark Warner, D-Va., have introduced federal legislation designed to protect critical technologies from supply chain attacks by China and other foreign threat actors. The bill, known as S. 2316 or the The Manufacturing, Investment, and Controls Review for Computer Hardware, Intellectual Property and Supply (MICROCHIPS) Act, would require U.S.…
IoT, Malware, Security News

Unlucky 13: Mirai variant uses baker’s dozen of exploits to compromise IoT devices

Researchers at Trend Micro have discovered another new variant of Mirai botnet malware that uses a unique combination of 13 exploits designed to hijack IoT devices. With these 13 exploits, this “Backdoor.Linux.MIRAI.VWIPT” variant is capable of targeting Vacron network video recorders, Dasan GPON routers, D-Link devices, various CCTV-DVR vendors, devices using Realtek SDK with the…
Next post in IoT