article thumbnail

Sweden bans Huawei and ZTE from building its 5G infrastructure

Security Affairs

The Swedish Post and Telecom Authority announced this week that four wireless carriers bidding for frequencies in an upcoming spectrum auction for the new 5G networks (Hi3G Access, Net4Mobility, Telia Sverige and Teracom) cannot use network equipment from the Chinese firms. China is one of the biggest threats to Sweden,” Friberg said.

IT 120
article thumbnail

Swedish court suspended the ban on Huawei equipment

Security Affairs

The Swedish Post and Telecom Authority announced that four wireless carriers bidding for frequencies in an upcoming spectrum auction for the new 5G networks (Hi3G Access, Net4Mobility, Telia Sverige and Teracom) cannot use network equipment from the Chinese firms.

Military 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

The message appeared to come from a genuine source, but after Kramer provided his credentials, he learned that he’d given an unauthorised person access to his wallet and digital assets. Tensions rose throughout February as the Russian military amassed across the Ukrainian border. I been hacked,” Kramer wrote on Twitter.

Security 132
article thumbnail

GUEST POST: How China’s updated digital plans impacts U.S. security and diplomacy

The Last Watchdog

As articulated in previous blog posts, both the BRI and DSR initiatives have been strategically positioned to facilitate secure trade and gain initial global footholds to accomplish the “Made in China 2025” goal. Those providers will be discussed in detail in the following blog. Both have displayed a shift away from the U.S.

Security 201
article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Related: The Golden Age of cyber spying A new book by Dr. Chase Cunningham — Cyber Warfare – Truth, Tactics, and Strategies — accomplishes this in a compelling, accessible way. And the policies in place for access and use are usually way too permissive.

Passwords 149
article thumbnail

New Cyberthreats for 2021

Adam Levin

There is a broad attack surface here — not just military and political but also insurance, law enforcement and commerce,” said Matt Turek, a program manager for the Defense Advanced Research Projects Agency to the Financial Times. The bad news is that hackers have access to the same technology. At the beginning of 2020, U.S.

IoT 52
article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. By contrast China takes a long view, as explicitly outlined in its Made in China 2025 manifesto.

IoT 171